• 11 de mayo de 2015
    How steganography is used to hide actual malware code in images and HTML files.
  • 08 de mayo de 2015
    Proper network segmentation is the most critical proactive step in protecting networks against targeted attacks. See why it's important for organizations to properly identify and categorize their own users and the networks they access.
  • 05 de mayo de 2015
    How steganography is used by cybercriminals as a technique for hiding data in unexpected channels such as images or app icons, to avoid detection.
  • 16 de marzo de 2015
    We noticed a problematic pattern developing: the increasing use of exploit kits in malvertising. Zero-day exploits are now deployed in malicious ads, instead of first being used in targeted attacks against enterprises and other organizations.
  • 16 de marzo de 2015
    A large number of repackaged Android apps have been showing up in Chinese app stores pretending to be "free¡±, but they still cost the users through various ads and subscriptions to various premium SMS services.
  • 10 de marzo de 2015
    In Operation Onymous, 17 people were arrested and 414 different .onion domains were seized by various law enforcement agencies around the world. Soon after, new marketplaces using I2P and new currencies sprung up. Read more on Deep Web shutdowns.
  • 21 de enero de 2015
    A pro-Russian group called CyberBerkut claimed responsibility for a recent hack on certain German government websites in early January. More information regarding its members and how they did have also surfaced.
  • 14 de enero de 2015
    Every year there are several zero-days and tons of undisclosed vulnerabilities fixed by software vendors. 2014 was a little different. Here are some of the year's most notable, and the lessons we can learn from them.
  • 09 de enero de 2015
    Video games have reached a point where it's rare for one to not feature an online component, since connectivity enhances the experience. Unfortunately, it also opens up the user and the platform to a number of risks. What can a gamer do?