IT threats during the 2016 Olympic Games in Brazil
Olympic threats designed to trick you Are you planning to visit Brazil during the Olympic Games? Or watch it online? In this blog post we discuss the threats to visitors aiming to travel to Brazil to watch the games and to those planning to watch it online. In the first part we’ll talk about phishing […] more…Great R packages for data import, wrangling, and visualization
The table below shows my favorite go-to R packages for data import, wrangling, visualization and analysis — plus a few miscellaneous tasks tossed in. The package names in the table are clickable if you want more information. To find out more about a package once you’ve installed it, type help(package = "packagename") in your R […] more…IT threat evolution Q3 2019
Targeted attacks and malware campaigns Mobile espionage targeting the Middle East At the end of June we reported the details of a highly targeted campaign that we dubbed ‘Operation ViceLeaker’ involving the spread of malicious Android samples via instant messaging. The campaign affected several dozen victims in Israel and Iran. We discovered this activity in […] more…Petya: the two-in-one trojan
Infecting the Master Boot Record (MBR) and encrypting files is nothing new in the world of malicious programs. Back in 1994, the virus OneHalf emerged that infected MBRs and encrypted the disk contents. However, that virus did not extort money. In 2011, MBR blocker Trojans began spreading (Trojan-Ransom.Win32.Mbro) that infected the MBR and prevented the […] more…More information
- Man-Machine Teamwork Needed for Effective Threat Hunting: Report
- Inspired by brain’s visual cortex, new AI utterly wrecks CAPTCHA security
- Over 1 Million Impacted in Data Breach at Texas Dental Services Provider
- Your smart air conditioner could contribute to mass power outages
- The ultimate guide to privacy on Android
- OpenVPN servers can be vulnerable to Shellshock Bash vulnerability
- New eLion Adviser
- Apple, IBM, and Google Don’t Care Anymore if You Went to College
- Security. Privacy. Identity.
- Microsoft Edge CVE-2018-8390 Remote Memory Corruption Vulnerability