All Blogs

News and views from the leading voice in cloud security.

By: Viral Gandhi

Android infostealer posing as a fake Google Chrome update

Mobile Malware

Our research team has recently seen a large amount of activity in our cloud related to an Android infostealer disguised as a Google Chrome update. This malware is capable of harvesting call logs, SMS data, browser history and banking information…
By: Ed Miles

Tax Season Scams


Introduction Tax Season is once again upon those of us who don t have a tax shelter company in Panama. This year, the IRS warned of a 400% increase in phishing attempts and tax related e-mail scams. While phishing can…
By: Kevin Peterson

What a Day for a Daydream

With all the ransomware and other attacks hitting healthcare this year (as predicted by the FBI), I keep finding myself having this recurring daydream in which I m a CISO for a hospital and I get called before the board…
By: Lauren Adams

You’ve Been Hacked – Do You Even Know It?

Live Educational Webcast: Tuesday, April 5th, 2016 | Americas - 8:30 a.m. PDT

A data breach happens in seconds, however, most companies take up to 6 months to recognize that a breach has even occurred. In 80% of cases, companies are blind to the fact that a breach has ever taken place and…
By: Michael Sutton

Prediction 10: The Encryption Showdown

Encrypted communications have long been the bane of law enforcement and those in the intelligence communities. As privacy concerns mount, thanks in part to the Snowden revelations, leveraging strong encryption for messaging and data storage is no longer the realm…
By: Dhanalakshmi

A look at Locky ransomware

Malware | Ransomware

Introduction The Locky ransomware was first spotted in the wild in February 2016. Locky came into the limelight when it hit the Hollywood Hospital last month causing the hospital to pay Bitcoins worth $17,000 in ransom.  Locky is known to…
By: Shivang Desai

Adult themed Android SMS Stealer Trojan

Mobile Malware

During our continued efforts to protect our customers against the latest mobile threats, we came across another malicious app that used pornography to attract users. Noting that 1 in 5 mobile searches are related to porn, it s no surprise…
By: Lauren Adams

World class security for your growing organization: Easy to deploy and hassle free

Protect your organization with the world s most widely deployed security platform Zscaler delivers unified, carrier-grade Internet security, advanced persistent threat (APT) protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence - all without the need…

Learn more about Zscaler.
Join one of our webcasts.

How secure are you?

Check your security with our instant risk assessment, Security Preview. It’s free, confidential and safe. 85% of companies who run this test find vulnerabilities that require immediate attention.

Average risk level results from people like you: VERY HIGH