Our defense techniques deceive malware into stopping malicious behavior, thinking it’s in a hostile or unattractive environment for it to attack by changing its perception of the system,
stopping it in its tracks.
Our offensive techniques detect known malicious behaviors, stop them before they do any damage to the endpoint.
Turning the offensive on the malware side.
“Deception technology […] is moving deeper into the endpoint level with vendors like Deceptive Bytes”.
Gartner’s blog, Feb 2017.
Our StoryFrom business experience to development to cyber. As brothers, we always wanted to utilize our knowledge and experience together to build a company. Understanding the need to counteract sophisticated and massive malware attacks worldwide, Deceptive Bytes was founded to provide an endpoint protection solution.
Our VisionWe want to build a company that provides comprehensive security products for enterprises, that will protect against various threats on every device & platform, using our core technology.
Latest news from our blog
We were recently listed in Smartrev Cybersec‘s first Israeli cyber startup observatory (Jan-2018 edition) Go to CyberStartupObservatory.com to learn more about Israel’s cyber startup landscape.
We recently talked to vpnMentor, a website dedicated to VPNs and web privacy, about Deceptive Bytes, deception technology and data security. Click here read the interview
There are various security measures you can take in order to protect your endpoint, some might be heavy on the machine and not necessarily that helpful, for instance, the traditional antivirus is only 20-40% effective, according to CheckPoint’s blog post from last year. Nevertheless, we do advise having some sort of security on your endpoint Read more about Improve your security without installing additional security software[…]
Since the beginning of the program we’ve been through a lot and we’re super excited to have CyLon’s demo days next week. Thanks to CyLon’s busy schedule and excellent preparations, we are ready to showcase Deceptive Bytes. Best of luck to our fellow cohort participants. Happy Holidays, The Team.
It’s been a while since we posted but we’ve been very busy presenting at CyberTech’s pavilion, meeting Gartner’s Avivah Litan, interviewing with accelerators and much more. We’re happy to officially announce that Deceptive Bytes was selected and is currently participating in CyLon accelerator’s fifth cohort. Different online media sources like Private Equity Wire, Tech City Read more about Deceptive Bytes is participating in CyLon accelerator[…]
2017 just started and it’s a great opportunity to remind you of ways to keep yourself and your devices (computers, smartphones and other connected devices) safe online: Make sure you have security products installed (Antivirus, Firewall, …) and kept up-to-date constantly. Stay updated, keep your operating system, drivers and software up-to-date since updates fix security Read more about Simple tricks to improve your online security[…]
Background Code injection is the exploiting of a bug or a system’s design in order to change the behavior of a process, a website or a system. Malware authors usually exploits such bugs in order to infect computers and devices, install malicious viruses and perform different tasks like stealing user’s passwords and banking information, spying Read more about Mozilla Firefox vulnerable to injection via Gecko configuration file[…]
In my previous post, I wrote that Anti-malware signatures are dead. Just days after, Check Point published on their blog that it’s estimated that nowadays traditional antivirus software detect between 20%-40% of malware, a decline from 2014, when a Symantec’s VP estimated the number at 45%, calling Antivirus software “dead”. Your Firewall and other similar Read more about Hello new and innovative security technologies[…]
Anti-malware signatures departure is imminent. For several years traditional antivirus companies are a few steps behind malware authors, unable to cover the millions of malwares created yearly. For example, check the latest posts and hashes at Malware Traffic Analysis with VirusTotal. Often, many engines may not recognize new threats, even from known malware families and Read more about Goodbye Anti-malware Signatures[…]
We’re a new next-gen cyber security startup. Details and new posts to follow soon, so stay tuned…