• July 24, 2014
    The “open“ nature of Android allows many app developers to explore the potential of the system. However, the very “open“ nature of Android could also allow abuse and exploits. live casino online analyzes some of these risks.
  • July 23, 2014
    Smart grids are power grids with digital capabilities. Given the widespread control smart grids hold over public utilities, attackers are likely to target them to gain power or extort money.
  • July 22, 2014
    By targeting session tokens sent via SMS in an elaborate fashion, a cybercriminal gang is able to intercept two-factor authentication and get your banking credentials. This attack is dubbed Operation Emmental.
  • July 21, 2014
    Smart meters are already installed in many cities across the globe. As more homes are installed with smart meters, homeowners should be aware of the possible risks they may bring.
  • July 18, 2014
    Hours after the fateful crash of Malaysia Airlines 777, suspicious .tk links on Twitter posts led to spyware downloads, while “actual footage“ posts on Facebook pointed to adware.
  • July 17, 2014
    Use-After-Free exploits are now unheard of. Thanks to “delay free,“ an improvement deployed by Microsoft on Internet Explorer 11. With this improvement, timing to occupy freed object space becomes difficult to find for an attacker.
  • July 17, 2014
    OpenWireless.org may have good intentions with its project to make routers, via firmware, that open wireless access to those near its range. However, this initiative carries critical risks that cannot be ignored.
  • July 16, 2014
    In an ideal world, IT administrators go out of their way to protect the organization's information. However, even IT admins are prone to misconceptions that leave organizations vulnerable to attacks.
  • July 15, 2014
    Repackaged apps use lures such as using a legitimate/popular app's icon or name. This method allows these malicious apps to thrive in app stores other than Google Play. live casino online research shows that repackaged apps are crucial in proliferation of mobile malw