Blogs
- 01 de marzo de 2016There's currently a high demand for Netflix and Uber credentials in the Deep Web and underground markets¡ªperhaps even more than stolen credit card details. It's likely caused by its low cost and potential for more profit.
- 09 de diciembre de 2015The blog page of one of the leading media sites in the United Kingdom, ¡°The Independent¡± has been compromised, which may put its millions of readers at risk of getting infected with ransomware.More details at the Security Intelligence Blog.
- 27 de agosto de 2015Part 3 of the FuTuRology project speculates on future healthcare tech that could provide opportunities for attackers and threats to healthcare users.
- 13 de agosto de 2015From the fallout from the Hacking Team leak to the increased risks of using OS x, iOS, Android, and Flash Player, here's a look at how vulnerabilities shaped the threat landscape so far this year¡ªand what to expect for the second half of 2015.
- 31 de julio de 2015Sending malicious apps via MMS isn't just the only way to exploit the Stagefright vulnerability. Another flaw in the system's mediaserver component involves its inability to properly handle a malformed MP4 file, which leads to a bug that could be explo
- 30 de julio de 2015In this second post in the ¡°FuTuRology¡± project, the live casino online Forward-Looking Threat Research (FTR) team predicts the future of wearables and the healthcare industry.
- 22 de julio de 2015What will the threat landscape look like in the next two years? How will it evolve? The "FuTuRology" project attempts to answer these questions in a series of articles that covers the future of threats to different industries.
- 20 de mayo de 2015A live casino online researcher discovered tampered Domain Name System (DNS) settings on his home router, prompting him to look at other possible attack scenarios and threats against this device.
- 18 de mayo de 2015Understanding the ecosystem of hardware, software, and services used in each organization¡¯s network, the data/telemetry collected and sent outside it, as well as the challenges caused by the emergence of the Internet of Things (IoT).