APT review of the year
What were the most interesting developments in terms of APT activity throughout the year and what can we learn from them? Not an easy question to answer; everybody has partial visibility and it’s never possible to really understand the motivations of some attacks or the developments behind them. Still, with the benefit of hindsight, let’s […] more…Streamin’ in the Sun – Your Essential Checklist for Safely Watching this Summer’s Biggest Events Online
With several major European sporting events, music festivals and a huge royal wedding on the way, this summer is set to be filled with many must-see moments. For those occasions where a television isn’t close by or the content is not freely available, many of us may resort to streaming services so that we can […] more…Are Your Online Mainframes Exposing You to Business Process Compromise?
by Roel Reyes (Senior Threat Researcher) Legacy mainframes are still used by enterprises to handle big data transactions across a range of industries, from financial institutions, telecoms, and internet service providers (ISPs) to airlines and government agencies. Why are they still in use? As the saying goes: “if it ain’t broke, don’t fix it”. But […] more…App Store Flooded with Phony Retail Apps to Kick Off Holiday Season
The holiday season has officially kicked off, which means a number of things for many of us: seasonal cheer, quality time with loved ones, and admittedly for many, lots and lots of shopping. And these days, many of holiday retail sales are happening online. Unfortunately, that also means now more than ever, there’s more holiday-related […] more…How to Secure the Future of the Internet of Things
The world of security for the Internet of Things just became more complex. IoT devices are no longer a potential threat to their owners; now they pose a significant threat to everything connected to the Internet. The old IoT security problem For the past year, the cybersecurity and IoT communities have been at odds regarding […] more…Malware tricks that you may not know about
There is a constant cat and mouse game between malware, security software companies and computer users, and the chance of one side winning the battle seems slim at best. Malwarebytes revealed recently on Malwarebytes Unpacked how Vonteera, a malware previously classified as adware, operates. While it may not be of interest to many how that […] more…Understanding the WordPress Security Plugin Ecosystem
As a child, did you ever play that game where you sit in a circle and one person is responsible for whispering something into one persons ear, and that message gets relayed around the circle? Wasn’t it always funny to see what the final message received would be? Oh and how it would have morphed […] more…Spy? Where? Mobile Spyware Hiding Right Under Your Nose
Some days it feels like the whole world is going mobile. We tweet, we text, we browse the world from small devices that fit into our hands. People from across the globe can reach out to each other with one message. You can buy a plane ticket while on the bus. There are apps that […] more…More information
- Microsoft Internet Explorer CVE-2012-0010 Cross Domain Information Disclosure Vulnerability
- How to unlock Google Assistant’s most advanced Android shortcuts
- Are you customer of a firm that’s been breached? Look out for more attacks
- London mayor joins NY, SF in battle against smartphone thefts
- Google tightens HTTPS protections in Gmail in light of government snooping
- Microsoft Publisher CVE-2013-1318 Remote Code Execution Vulnerability
- Provider of Data Integration Services for Fortune 100 Firms Exposed Sensitive Files
- Servers of email host used in US school bomb threats seized by German police
- Feds list the top 30 most exploited vulnerabilities. Many are years old
- Facebook will send encrypted emails if users add PGP key to profile