"Protector Air has revolutionized the way banks are preventing cyber-attacks and fraud, as the only frictionless, unified solution that protects against both."read more about how protector Air can keep you secure
The Latest from our Blog
The internet is a dangerous place and we’ve reached a point where simply going about our online business is fraught with risks. You just don’t know what’s lying behind a link, or which advertisements popping up across webpages are potentially […]
The UK is leading the charge in attempting to revolutionize banking. In January this year, high-street banks were required to comply with new regulations around Open Banking – although only three of the nine banks were ready, the rest have […]
Researchers from FireEye recently reported the reappearance of a strain of malware first seen in 2016. Zyklon is a multi-faceted piece of malware that can be used by its handlers for password gathering and keylogging, as well as drawing victims’ […]
Together, we learn from the past and then we adapt
Attacks against retailer
point-of-sale (pos) systems
In recent years, a number of large retailers have suered the compromise of customers credit card data from point-of-sale (PoS) systems. In 2013 and 2014, Target and Home Depot became two of the more high-profile victims of this type of breach. It is likely that both intrusions were the work of the same criminal group…
Internal Data Theft
at JP Morgan Chase
In July of 2014, J.P. Morgan Chase discovered a month-long breach of their corporate network that exposed personal information of about 76 million households and more than 7 million small businesses. Attackers leveraged their initial entry to eventually gain access to over 90 servers across the enterprise….
Keylogger Theft of Consumer
On December 26, 2014, a group of criminals claiming aliation with Anonymous released a file of more than 13,000 credentials for sites including Walmart, Amazon, Playstation Live, and Hulu Plus. These were clearly obtained from keylogging botnets and almost certainly represent only a portion of the credentials captured from the compromised computers as the attackers likely kept the higher-value data for themselves…
Demo Our Solutions Today!
Experience the simplicity of Trusted Knight's full suite of security solutions
Try our solutions for 14 days with no changes to existing applications, security tools or infrastructure.Questions?