• 04 setembro 2014
    When attackers look at a target network, they focus on the flaws that they can exploit, then customize their attacks based on these. What can IT admins do knowing that the weakest link usually lie with people, passwords, and places that are considered secure?
  • 29 agosto 2014
    A case of spammers looking for legitimate ways to send spam. Our research shows an IP provider in Canada and several US-registered domains were found to be sending salad words spam.
  • 29 agosto 2014
    Point of sales (PoS) malware in the form of BlackPOS have been seen in the wild, masquerading as an antimalware service. Our analysis found new code designed to avoid easy detection.
  • 28 agosto 2014
    A new variant of the backdoor BIFROSE, known for its keylogging techniques, was found in an attack against a device manufacturer. The malware was already elusive back in 2010, but its use of TOR to reach its servers makes it even harder to track.
  • 27 agosto 2014
    “Windows 9 Free Download!“ sounds too good to be true but cybercriminals still use bait like this to get you to install adware on your computer.
  • 27 agosto 2014
    Mobile malware continues to rise and vary - ransomware and bitcoin-mining malware emerge. Vulnerabilities in Android abound. Our review of the first half of 2014 reveals these results.
  • 25 agosto 2014
    live casino online research shows that almost all Netis/Netcore routers have an open port that allows a knowledgeable attacker to exploit your computer and network. It may be time to replace your router.
  • 21 agosto 2014
    FlashPack exploit kits that affected more than 60K Japanese users were found to be delivered via a compromised website add-on. The tool adds social media sharing buttons on a webpage that may lead to an Adobe Flash exploit.
  • 19 agosto 2014
    While the smartification of the home has its benefits, the growing number of smart devices also requires a lot of time and energy just to maintain and manage the network of connected devices. What does it take to play the role of “Administrator of Things“?