Product
Game Protection
Anti-Cheat & Anti-Hack
Online Protection
Solutions
FPS Game Solution
SLG Game Solution
Casual Game Solution
MMO Game Solution
Card Game Solution
Help Center
Android
User Manual
Tool Download
FAQ
iOS
User Manual
Tool Download
FAQ
Windows
User Manual
Tool Download
FAQ
Blog
Price
Android
iOS
Windows
Company
About us
Why JikGuard
Contact us
Free Trial
News
Ancient Mac Site Harbors Botnet that Exploits IE Vulnerability
This post was authored by Alex Chiu and Shaun Hurley. Last month, Microsoft released a security bulletin to patch CVE-2014-6332, a vulnerability within
Dec. 15, 2014
Threat Spotlight: Group 72
This post is co-authored by Joel Esler, Martin Lee and Craig Williams Everyone has certain characteristics that can be recognised. This may be a way of
Oct. 14, 2014
Securing Mobile Data: What’s Your Plan?
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always
July 24, 2014
Old and Persistent Malware
Malware can find its way into the most unexpected of places. Certainly, no website can be assumed to be always completely free of malware. Typically,
July 21, 2014
The Art of Escape
Craig Williams and Jaeson Schultz have contributed to this post. We blogged in September of 2013 about variants of Havex. A month ago on June 2, 2014, I
July 3, 2014
Threat Spotlight: A String of ‘Paerls’, Part One
This post was co-authored by Jaeson Schultz, Joel Esler, and Richard Harman. Update 7-8-14: Part 2 can be found here This is part one in a two-part
June 30, 2014
RATs in Your Data Center
News agencies like ABC News, CNN, and others have run stories on the FBI sting operation against more than 100 hackers who were involved in using and/or
May 29, 2014
Executing on our Vision: Cisco’s Comprehensive Advanced Malware Protection
The increased scrutiny on security is being driven by the evolving trends of expanding networks, mobility, cloud computing and a threat landscape that is
May 22, 2014
Control Without Compromise Through Superior Data Center Protection
The news of high-profile targeted data center attacks has dominated security news recently. But data center attacks are even more prevalent than those headlines suggest. In fact, a survey conducted...
May 22, 2014
Cupcakes and Cyber Espionage
This blog will suggest a change of strategy in how we address the threat of cyber espionage. One which leverages traditional tactics of
May 20, 2014
April 2014 Threat Metrics
April kicked off with a 1:292 rate of malware encounters and closed with a rate of 1:315. Highest peak day was April 20 when the rate reached 1:177.
May 20, 2014
Google admits it’s reading your emails, tells court Gmail users should not expect privacy
"Google's brief uses a wrong-headed analogy... I expect the Post Office to deliver the letter based on the address written on the envelope. I don't expect the
April 17, 2014
Prev
1
...
18
19
20
21
22
23
24
Next