Blogs
- May 05, 2015How steganography is used by cybercriminals as a technique for hiding data in unexpected channels such as images or app icons, to avoid detection.
- March 10, 2015In Operation Onymous, 17 people were arrested and 414 different .onion domains were seized by various law enforcement agencies around the world. Soon after, new marketplaces using I2P and new currencies sprung up. Read more on Deep Web shutdowns.
- January 21, 2015A pro-Russian group called CyberBerkut claimed responsibility for a recent hack on certain German government websites in early January. More information regarding its members and how they did have also surfaced.
- January 14, 2015Every year there are several zero-days and tons of undisclosed vulnerabilities fixed by software vendors. 2014 was a little different. Here are some of the year's most notable, and the lessons we can learn from them.
- January 09, 2015Video games have reached a point where it's rare for one to not feature an online component, since connectivity enhances the experience. Unfortunately, it also opens up the user and the platform to a number of risks. What can a gamer do?
- January 08, 2015There's a significant increase in the number of spammed messages with links that lead to various Russian dating sites. While these types of messages are fairly common, this recent wave is unusual in several ways.
- December 26, 2014A collaboration between live casino online and Facebook found attacks that actively attempt to exploit an existing vulnerability. The attack targets Facebook users via a link in a particular page that leads to a malicious site.
- December 06, 2014A look into the other WIPALL malware variants that may be linked to the Sony Pictures incident, including a variant that disables the running antivirus application and another that displays a warning message.
- December 05, 2014How did hackers manage to drop a “warning“ wallpaper into Sony Pictures' office computers? With a malware family that we've seen before.