The Blog

Catch up with the latest news on technology and cyber security, right here.

How You Can Create a Strong Corporate Cybersecurity Vision

How You As a Leader can Create a Strong Corporate Cybersecurity Vision It’s important to have a strong vision and a comprehensive plan. To reach the right level of cybersecurity, leadership  is crucial to be able to bring the idea that this is the...
Read More

iOS and Android devices under attack

New malware found, that are attacking both Android and iOS devices. It time for bank costumer’s to demand that their bank invest in new cyber security tools that will prevent today’s cybercrime. Widespread routers’ DNS hijacking malware...
Read More

Security Key for Windows Hello

  Our Trusted Partner Feitian has worked closely with Microsoft to provide a ubiquitous, hardware-backed logon experience through Windows Hello. For enterprises who use passwords today and have a shared PC environment, security keys for Windows Hello...
Read More

CREDENTIAL STUFFING DEFENSE

Credential compromise is a cyclical issue. It begins of course with the theft of credentials such as user IDs, email addresses and passwords. Then the credentials are often released, a process known as spilling, onto the dark web. Finally, the credentials...
Read More

Know Your Customer (KYC)

Prevent criminal and fraudulent customers from entering your client base and stay compliant with Anti-Money Laundering (AML) and Know Your Customer (KYC) requirements. By using top-tier forensic technology in your Due Diligence process you are activating...
Read More

Ciptor is driving cybersecurity by connecting the correct cybersecurity solution for corporates

Background Mikael Zaman Rodin, Ciptor’s founder and CEO, he started to work with Two-factor Authentication projects in 2009. He found it really tough to find an easy and trustable complete solution that his client’s was looking for. To find that one...
Read More

Prepare your application for GDPR with Triggerfish

Much is being spoken about the General Data Protection Regulation, GDPR, which from 25th of may will regulate the handling of personal information in Sweden. It replaces Personuppgiftslagen (PuL) and will require extensive changes to organisations and...
Read More

Cyber Security Trends 2018

What are the biggest cyber security trends to look out for in 2018? We’ve put our top cyber security researcher on the case to identify top shifts in technology for 2018. ”When big changes happen it is often because regulation, user preference and...
Read More

Identify Security Vulnerabilities

Companies today are exposed to daily attack attempts where attackers use automated tools to detect vulnerabilities. These tools allow an attacker to gain access to confidential customer information. The automatic tools these attackers use are becoming...
Read More

MALWARE AND MOBILE THREAT UPDATE

ANDROID BANKING TROJAN CAN BLOCK CALLS, BANKBOT TROJAN DISGUISED AS GAME, MALWARE STEALS BANKING CREDENTIALS, SEO-OPTIMZED MALWARE LINKS, IPHONE X JAIL BREAKIMMINENT, OLD BANKING TROJAN MAKES A COMEBACK Welcome to the latest update where we compile recent...
Read More