• May 11, 2015
    How steganography is used to hide actual malware code in images and HTML files.
  • May 08, 2015
    Proper network segmentation is the most critical proactive step in protecting networks against targeted attacks. See why it's important for organizations to properly identify and categorize their own users and the networks they access.
  • May 05, 2015
    How steganography is used by cybercriminals as a technique for hiding data in unexpected channels such as images or app icons, to avoid detection.
  • March 16, 2015
    We noticed a problematic pattern developing: the increasing use of exploit kits in malvertising. Zero-day exploits are now deployed in malicious ads, instead of first being used in targeted attacks against enterprises and other organizations.
  • March 16, 2015
    A large number of repackaged Android apps have been showing up in Chinese app stores pretending to be "free¡±, but they still cost the users through various ads and subscriptions to various premium SMS services.
  • March 10, 2015
    In Operation Onymous, 17 people were arrested and 414 different .onion domains were seized by various law enforcement agencies around the world. Soon after, new marketplaces using I2P and new currencies sprung up. Read more on Deep Web shutdowns.
  • January 21, 2015
    A pro-Russian group called CyberBerkut claimed responsibility for a recent hack on certain German government websites in early January. More information regarding its members and how they did have also surfaced.
  • January 14, 2015
    Every year there are several zero-days and tons of undisclosed vulnerabilities fixed by software vendors. 2014 was a little different. Here are some of the year's most notable, and the lessons we can learn from them.
  • January 09, 2015
    Video games have reached a point where it's rare for one to not feature an online component, since connectivity enhances the experience. Unfortunately, it also opens up the user and the platform to a number of risks. What can a gamer do?