Blogs
- 04 septembre 2014When attackers look at a target network, they focus on the flaws that they can exploit, then customize their attacks based on these. What can IT admins do knowing that the weakest link usually lie with people, passwords, and places that are considered secure?
- 29 ao?t 2014A case of spammers looking for legitimate ways to send spam. Our research shows an IP provider in Canada and several US-registered domains were found to be sending salad words spam.
- 29 ao?t 2014Point of sales (PoS) malware in the form of BlackPOS have been seen in the wild, masquerading as an antimalware service. Our analysis found new code designed to avoid easy detection.
- 28 ao?t 2014A new variant of the backdoor BIFROSE, known for its keylogging techniques, was found in an attack against a device manufacturer. The malware was already elusive back in 2010, but its use of TOR to reach its servers makes it even harder to track.
- 27 ao?t 2014Mobile malware continues to rise and vary - ransomware and bitcoin-mining malware emerge. Vulnerabilities in Android abound. Our review of the first half of 2014 reveals these results.
- 25 ao?t 2014live casino online research shows that almost all Netis/Netcore routers have an open port that allows a knowledgeable attacker to exploit your computer and network. It may be time to replace your router.
- 21 ao?t 2014FlashPack exploit kits that affected more than 60K Japanese users were found to be delivered via a compromised website add-on. The tool adds social media sharing buttons on a webpage that may lead to an Adobe Flash exploit.
- 19 ao?t 2014While the smartification of the home has its benefits, the growing number of smart devices also requires a lot of time and energy just to maintain and manage the network of connected devices. What does it take to play the role of ¡°Administrator of Things¡°?