Buyer’s guide: How to choose the right business laptops
With hundreds of business-oriented laptops to choose from, picking the right ones to outfit your company’s workforce can be daunting. We’re here to help with a buyer’s guide that breaks the options into categories and provides details, price estimates, and pros and cons of each. Ranging from $200 for the cheapest budget models to nearly […] more…IT threat evolution Q1 2019
Targeted attacks and malware campaigns Go Zebrocy Zebrocy was first observed being used as a Sofacy backdoor in 2015. However, the collection of cases where this tool has been used mean that we consider it a subset of activity in its own right. On the basis of this threat actor’s past behaviour, we predicted last […] more…APT review of the year
What were the most interesting developments in terms of APT activity throughout the year and what can we learn from them? Not an easy question to answer; everybody has partial visibility and it’s never possible to really understand the motivations of some attacks or the developments behind them. Still, with the benefit of hindsight, let’s […] more…8 steps to regaining control over shadow IT
A dangerous practice on the rise Image by Pexels “Shadow IT” refers to the too-common practice whereby managers select and deploy cloud services without the consent or even the knowledge of the IT department. These services act as extensions of the corporation but are steered entirely by groups that lack the knowledge or process to […] more…EyePyramid and a Lesson on the Perils of Attribution
In the past weeks, information-stealing malware EyePyramid made headlines after it was used to steal 87GB of sensitive data from government offices, private companies and public organizations. More than 100 email domains and 18,000 email accounts were targeted, including those of high-profile victims in Italy, the U.S., Japan and Europe. The natural assumption for many […] more…SINOWAL Attempts To Disable Rapport, Aid ZBOT
The year might be coming to a close but we’re still seeing our 2013 predictions come true. We encountered an attack that featured an old malware with new routines. This malware, detected as BKDR_SINOWAL.COP specifically attempts to disable the Rapport software from Trusteer. Figure 1. Code that looks for the Trusteer Rapport module Rapport is software […] more…Observations on the Evolution of Cyber Tactics in 2013
“There is one thing stronger than all the armies in the world, and that is an idea whose time has come.” – Victor Hugo The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that […] more…More information
- After Paris Attacks, Here’s What the CIA Director Gets Wrong About Encryption
- Setting up a Windows 10 picture PIN
- DOJ’s charges against China reframe security, surveillance debate
- Meta may be forced to shutter Facebook, Instagram in EU
- Dissecting the WordPress 5.2.3 Update
- Skimmers for Both Magento and WordPress
- Spam one step ahead of iPhone 5 release
- iPhone 6 release date, rumours and price
- 5 cybersecurity predictions (that might actually come true)
- French fine Google over change in privacy policy