Privacy, please! Why a VPN on your smartphone may be a smart move for you.
Using a VPN on your smartphone can boost your privacy in a big way, particularly with all the data tracking that’s happening out there today. For some time now, we’ve recommended a VPN when using public Wi-Fi in airports, libraries, hotels, and coffee shops. Given that these are public networks, a determined hacker can snoop […] more…Spam and phishing in Q3 2021
Quarterly highlights Scamming championship: sports-related fraud This summer and early fall saw some major international sporting events. The delayed Euro 2020 soccer tournament was held in June and July, followed by the equally delayed Tokyo Olympics in August. Q3 2021 also featured several F1 Grand Prix races. There was no way that cybercriminals and profiteers could […] more…Stolen Data from Chinese Hotel Chain and Other Illicit Products Sold in Deep Web Forum
by Fyodor Yarochkin (Senior Threat Researcher) We uncovered personally identifiable information (PII) stolen from a China-based hotel chain being sold on a deep web forum we were monitoring. Further analysis revealed that the stolen data was not only the PII of Chinese customers, but also included the hotel chain’s customers from Western and East Asian […] more…Hackers Hijack a Big Rig Truck’s Accelerator and Brakes
When cybersecurity researchers showed in recent years that they could hack a Chevy Impala or a Jeep Cherokee to disable the vehicles’ brakes or hijack their steering, the results were a disturbing wakeup call to the consumer automotive industry. But industrial automakers are still due for a reminder that they, too, are selling vulnerable computer […] more…Guard Against Sandbox-Bypassing Adobe Reader Zero-Day
News of the ‘unknown’ and underground zero-day in Adobe Reader is all over the place. Because of its supposed noteworthy features, including the capability to defeat Adobe’s sandbox feature, users are alarmed – and rightfully so. But the situation is not without hope. With this entry, my aim is to explain to our customers what […] more…More information
- Microsoft Excel CVE-2018-8597 Remote Code Execution Vulnerability
- Report: Startup promises to catch 100% of network attacks with unique detection technology
- New RIG Campaign Distributes Cerber Ransomware
- Edward Snowden says the NSA has an autonomous Monstermind
- Don’t let the crooks ‘borrow’ your home router as a hacking server
- Spotify offers playlists tailored to your DNA
- New IoT Botnet Discovered, 120K IP Cameras At Risk of Attack
- Check Point takes best approach to URL filtering
- Chinese Hackers Exploit Old ThinkPHP Vulnerabilities in New Attacks
- Risk assessments for local governments and SMBs