Blogs
- 11 de mayo de 2015How steganography is used to hide actual malware code in images and HTML files.
- 08 de mayo de 2015Proper network segmentation is the most critical proactive step in protecting networks against targeted attacks. See why it's important for organizations to properly identify and categorize their own users and the networks they access.
- 05 de mayo de 2015How steganography is used by cybercriminals as a technique for hiding data in unexpected channels such as images or app icons, to avoid detection.
- 16 de marzo de 2015A large number of repackaged Android apps have been showing up in Chinese app stores pretending to be "free¡±, but they still cost the users through various ads and subscriptions to various premium SMS services.
- 10 de marzo de 2015In Operation Onymous, 17 people were arrested and 414 different .onion domains were seized by various law enforcement agencies around the world. Soon after, new marketplaces using I2P and new currencies sprung up. Read more on Deep Web shutdowns.
- 21 de enero de 2015A pro-Russian group called CyberBerkut claimed responsibility for a recent hack on certain German government websites in early January. More information regarding its members and how they did have also surfaced.
- 14 de enero de 2015Every year there are several zero-days and tons of undisclosed vulnerabilities fixed by software vendors. 2014 was a little different. Here are some of the year's most notable, and the lessons we can learn from them.
- 09 de enero de 2015Video games have reached a point where it's rare for one to not feature an online component, since connectivity enhances the experience. Unfortunately, it also opens up the user and the platform to a number of risks. What can a gamer do?