• September 25, 2014
    A serious vulnerability has been found in the Bash command shell commonly used by most Linux distributions. This vulnerability allows an attacker to run commands, such as remote code execution, on an affected system.
  • September 15, 2014
    The backdoor malware MIRAS got an upgrade from just running in 32-bit Windows operating system versions to 64-bit ones, expanding its victim range to more users of the OS. MIRAS is the same malware family linked to attacks against a Europe-based IT company.
  • September 15, 2014
    Certain versions of Google Wallet and Alipay in-app payment SDKs contain a vulnerability that could allow phishing attacks. Our analysis of the two SDKs describes the vulnerability in detail.
  • September 14, 2014
    Threats analyst Bryant Tan shares some rules that IT administrators can proactively implement to set up “basic defense” for their network. These rules are not meant to cover all types of suspicious activity but are important in building a secure network.
  • September 14, 2014
    A few rules that IT administrators can proactively implement to set up “basic defenses” for their network that are likely to be missed.
  • September 09, 2014
    The last post in the series discusses High-Risk/Low-Feasibility attacks, which is the most damaging of the three attack scenarios.
  • September 08, 2014
    In the previous post, we talked about the definition and categories of “wearables“. We will now focus on possible attacks for such devices. The probability of attack increases depending on where the attack takes place, as we learned from these scenarios.
  • September 04, 2014
    Smart wearables are rapidly becoming more commonplace than you think.With ‘wearable devices,’ we mean those pieces of equipment that people can have on themselves as they go about their day. In this series of posts, we are going to review possible attacks and
  • September 04, 2014
    When attackers look at a target network, they focus on the flaws that they can exploit, then customize their attacks based on these. What can IT admins do knowing that the weakest link usually lie with people, passwords, and places that are considered secure?