Blogs
- 14 de noviembre de 2014Microsoft released 16 security updates during its Patch Tuesday release for November 2014, including one for the Windows OLE Automation Array Remote Code Execution Vulnerability that affects almost all Windows versions.
- 29 de octubre de 2014A new Shellshock attack targeting SMTP servers has been discovered. Attackers used email to deliver the exploit, which downloads and executes an IRC Bot.
- 26 de octubre de 2014Zero-day exploits aren't the only exploits used in the targeted attack landscape. In the first half of 2014, we also found out that attackers still heavily target older vulnerabilities.
- 24 de octubre de 2014This Operation Pawn Storm attack scenario involves the use of phishing emails. See how one line of Javascript code could place millions of Outlook Web Access (OWA) users at risk of becoming victims of a simple, but clever phishing attack.
- 22 de octubre de 2014Despite the availability of fixes related to the Sandworm vulnerability (CVE-2014-4114), new attacks related to this flaw are still being spotted. These attacks contain a new routine that could prevent detection.
- 21 de octubre de 2014We've seen malware that takes advantage of cloud-based sharing sites such as DropBox, Sendspace, and Evernote. Add Google Drive to that list. We recently came across malware that uses Google Drive as one way of siphoning information from its victims.
- 20 de octubre de 2014Recent data breaches in big enterprises make one thing clear: data privacy and protection is a concern for all organizations, not just large ones. Data privacy isn't just a ¡°big business¡° problem. Even smaller organizations are at risk.
- 20 de octubre de 2014Smart locks are very convenient devices that allow users to lock or unlock doors remotely or detect break-ins remotely. But are they secure enough?
- 15 de octubre de 2014While the Internet of Everything is designed to make life easier with the use of interconnected networks and devices, you still have to remember that there are many ways your data can be misused or compromised.