Product
Game Protection
Anti-Cheat & Anti-Hack
Online Protection
Solutions
FPS Game Solution
SLG Game Solution
Casual Game Solution
MMO Game Solution
Card Game Solution
Help Center
Android
User Manual
Tool Download
FAQ
iOS
User Manual
Tool Download
FAQ
Windows
User Manual
Tool Download
FAQ
Blog
Price
Android
iOS
Windows
Company
About us
Why JikGuard
Contact us
Log in
Free Trial
News
Threat Spotlight: Group 72
This post is co-authored by Joel Esler, Martin Lee and Craig Williams Everyone has certain characteristics that can be recognised. This may be a way of
Oct. 14, 2014
Securing Mobile Data: What’s Your Plan?
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always
July 24, 2014
Old and Persistent Malware
Malware can find its way into the most unexpected of places. Certainly, no website can be assumed to be always completely free of malware. Typically,
July 21, 2014
The Art of Escape
Craig Williams and Jaeson Schultz have contributed to this post. We blogged in September of 2013 about variants of Havex. A month ago on June 2, 2014, I
July 3, 2014
Threat Spotlight: A String of ‘Paerls’, Part One
This post was co-authored by Jaeson Schultz, Joel Esler, and Richard Harman. Update 7-8-14: Part 2 can be found here This is part one in a two-part
June 30, 2014
RATs in Your Data Center
News agencies like ABC News, CNN, and others have run stories on the FBI sting operation against more than 100 hackers who were involved in using and/or
May 29, 2014
Executing on our Vision: Cisco’s Comprehensive Advanced Malware Protection
The increased scrutiny on security is being driven by the evolving trends of expanding networks, mobility, cloud computing and a threat landscape that is
May 22, 2014
Control Without Compromise Through Superior Data Center Protection
The news of high-profile targeted data center attacks has dominated security news recently. But data center attacks are even more prevalent than those headlines suggest. In fact, a survey conducted...
May 22, 2014
Cupcakes and Cyber Espionage
This blog will suggest a change of strategy in how we address the threat of cyber espionage. One which leverages traditional tactics of
May 20, 2014
April 2014 Threat Metrics
April kicked off with a 1:292 rate of malware encounters and closed with a rate of 1:315. Highest peak day was April 20 when the rate reached 1:177.
May 20, 2014
Google admits it’s reading your emails, tells court Gmail users should not expect privacy
"Google's brief uses a wrong-headed analogy... I expect the Post Office to deliver the letter based on the address written on the envelope. I don't expect the
April 17, 2014
Hackers Target Monster Jobs Website with Gameover Zeus malware
A security firm has revealed that hackers are targeting companies utilizing services of Monster Jobs, a well-known job portal, through a new variant of the
March 28, 2014
Prev
1
...
18
19
20
21
22
23
Next