Blogs
- September 14, 2014Threats analyst Bryant Tan shares some rules that IT administrators can proactively implement to set up “basic defense” for their network. These rules are not meant to cover all types of suspicious activity but are important in building a secure network.
- September 14, 2014A few rules that IT administrators can proactively implement to set up “basic defenses” for their network that are likely to be missed.
- September 09, 2014The last post in the series discusses High-Risk/Low-Feasibility attacks, which is the most damaging of the three attack scenarios.
- September 08, 2014In the previous post, we talked about the definition and categories of “wearables“. We will now focus on possible attacks for such devices. The probability of attack increases depending on where the attack takes place, as we learned from these scenarios.
- September 04, 2014Smart wearables are rapidly becoming more commonplace than you think.With ‘wearable devices,’ we mean those pieces of equipment that people can have on themselves as they go about their day. In this series of posts, we are going to review possible attacks and
- September 04, 2014When attackers look at a target network, they focus on the flaws that they can exploit, then customize their attacks based on these. What can IT admins do knowing that the weakest link usually lie with people, passwords, and places that are considered secure?
- August 29, 2014A case of spammers looking for legitimate ways to send spam. Our research shows an IP provider in Canada and several US-registered domains were found to be sending salad words spam.
- August 29, 2014Point of sales (PoS) malware in the form of BlackPOS have been seen in the wild, masquerading as an antimalware service. Our analysis found new code designed to avoid easy detection.
- August 28, 2014A new variant of the backdoor BIFROSE, known for its keylogging techniques, was found in an attack against a device manufacturer. The malware was already elusive back in 2010, but its use of TOR to reach its servers makes it even harder to track.