Attackers are finding more security gaps to abuse, whether they're in existing public-facing technologies or in new developments in the Internet of Things.
Earlier this year, a PoC malware that could infect Apple Macs through a Thunderbolt accessory was introduced. The sequel to the “Thunderstrike“ exploit doesn’t need physical access and can now be delivered online—just like PC threats.
What will the threat landscape look like in the next two years? How will it evolve? The "FuTuRology" project attempts to answer these questions in a series of articles that covers the future of threats to different industries.
Watch what happens during a ransomware infection, from the time a user receives the email with the spiked attachment to the time the malware itself is executed.
Videogame mods are used as a way to tweak how a game looks, feels, and works. While not inherently bad, game mods do come with a fair share of risks. Case in point: recent incidents show that they're also being used as a way to deliver malware.