Category: All

ZAM 3.0 Release Notes: You Can Now Scan Your PC in Safe Mode Too!

With the help from all of you, our hard work on ZAM 3.0 continues. Thanks to your comments, we realized that many of you were sad that the Safe Mode scanning feature was not available in ZAM 2.0. So, you will be happy to learn that we changed this. From now on, with ZAM 3.0, ...

ZAM 3.0 Release Notes: The New Version Is All About You

The progress on the beta version of our ZAM 3.0 is going great! All thanks to you, guys.Β However, there is still hard work to be done. New ZAM 3.0 is all about you! In other words, we put our product road-map in your hands. You will lay foundations and then it is up to us ...

Here is What Businesses Need to Know: Security Trends for 2019

2018 was a year that brought major breaches pretty much every week. So, in May, GDPR came into force as necessary means in protecting companies and their clients. Cyber security is still an important issue that troubles business world. As it seems, businesses will need to invest more resources and energy, if they wish to ...

Designed by Vectorpouch, can be found on https://www.freepik.com/free-vector/cyber-security-technology-illustration-of-private-network-secure-access-and-internet-firewall_2890889.htm

Untold Truth Of 2018 and What to Expect From 2019

There are a few days left for another year to end. During this year, many exploits were found and many governments, small and large companies suffered from cyber-attacks. Let’s remember some of the incidents that caused trouble… As the value of bitcoin increased to 20,000 USD during the first month of 2018, cyber-attacks slightly changed ...

2018 Cyber Security Overview

Christmas time is behind us and we are heading towards New Year, so we decided to take a moment, look back at 2018 and remember the major security trends:   From .exe Files to Package and Deploy Malware One of the most significant trends we saw early 2018 is the ongoing shift away from using ...

Full Scan or Smart Scan?

On the ZAM 3.0 Beta UI you saw two scan options. Smart scan and Full scan. You have also noticed that this full scan feature is not ready yet and that it is in our very near development process due to the high importance of the feature. What is the difference between these two scans ...

Progression from Stealth to Damage and Disruption

A decade or two ago, hackers were infiltrating the targeted network silently; they were waiting for the perfect moment to act and exit with no evidence left behind them. Thus, their attacks were unnoticeable and even the target companies hardly noticed that they were the victims of a cyber espionage or cyber-attacks. Hackers were lurking ...