Product
Game Protection
Anti-Cheat & Anti-Hack
Online Protection
Solutions
FPS Game Solution
SLG Game Solution
Casual Game Solution
MMO Game Solution
Card Game Solution
Help Center
Android
User Manual
Tool Download
FAQ
iOS
User Manual
Tool Download
FAQ
Windows
User Manual
Tool Download
FAQ
Blog
Price
Android
iOS
Windows
Company
About us
Why JikGuard
Contact us
Free Trial
News
Far East Targeted by Drive by Download Attack
This blog was co-authored by Kevin Brooks, Alex Chiu, Joel Esler, Martin Lee, Emmanuel Tacheau, Andrew Tsonchev, and Craig Williams. On the 21st of
July 28, 2014
Old and Persistent Malware
Malware can find its way into the most unexpected of places. Certainly, no website can be assumed to be always completely free of malware. Typically,
July 21, 2014
Big Data: Observing a Phishing Attack Over Years
Overview Phishing attacks use social engineering in an attempt to lure victims to fake websites. The websites could allow the attacker to retrieve
July 14, 2014
The Art of Escape
Craig Williams and Jaeson Schultz have contributed to this post. We blogged in September of 2013 about variants of Havex. A month ago on June 2, 2014, I
July 3, 2014
Threat Spotlight: A String of ‘Paerls’, Part One
This post was co-authored by Jaeson Schultz, Joel Esler, and Richard Harman. Update 7-8-14: Part 2 can be found here This is part one in a two-part
June 30, 2014
RIG Exploit Kit Strikes Oil
This post was co-authored by Levi Gundert with contributions from Emmanuel Tacheau and Joel Esler. In the last month we have observed high levels of
June 5, 2014
Walking in a Winter Wonderland
It is not uncommon to see an anti-spam system catch >99% of the spam passing through it. Most of the best anti-spam systems catch >99.9% of spam. In
May 30, 2014
April 2014 Threat Metrics
April kicked off with a 1:292 rate of malware encounters and closed with a rate of 1:315. Highest peak day was April 20 when the rate reached 1:177.
May 20, 2014
Understanding Security Through Probability
This post was also authored by Min-yi Shen and Martin Lee. Security is all about probability. There is a certain probability that something bad will
March 20, 2014
Coordinated Website Compromise Campaigns Continue to Plague Internet
This post is co-authored with Levi Gundert and Andrew Tsonchev. Update 2014-03-21: For clarity, the old kernel is a common indicator on the compromised
March 20, 2014
Big Data Ecosystem Challenges
Information security is one of the largest business problems facing organisations. Log data generated from networks and computer systems can be
March 4, 2014
Trust but Verify and Verify and Verify Again
Two recent disclosures show that often the weaknesses in cryptography lie not in the algorithms themselves, but in the implementation of these algorithms
Feb. 25, 2014
1
2
3
Next