Security
Biggest Cybercriminal Ad-Fraud Rakes in Millions per Day - Methbot is a state-of-the-art ad fraud infrastructure, capable of hosting legitimate videos and serving them to 300 million fake viewers...
read more »Avalanche Cybercriminal Infrastructure Takedown - Congratulations to the multinational government agencies involved in the takedown of the Avalanche cybercriminal infrastructure! The U.S. Attorney’s Office, FBI,...
read more »PoisonTap USB can Hack a Locked PC in a Minute - PoisonTap is a fully automated proof-of-concept USB device which when connected to a locked PC, hacks the device and installs...
read more »Did You Forget to Patch Your IP Camera? - IP cameras are usually a purchase, install, and don’t-touch type of device. But in the current climate of cyber-attacks, they...
read more »This Ransomware Turns Victims Against Their Associates - Popcorn Time ransomware, a newcomer to the malware scene, has an incentive program for victims. If they successfully infect others...
read more »Smart Hospitals Need to be Secured - I want my hospital to be smart, but I demand it be secure and safe! A new report from the...
read more »Cybercriminals Next Targets: Long Term Prizes (part 2 of 2) - In the previous blog, Cybercriminals Next Targets: Short Term Dangers (part 1 of 2), I outlined how cybercriminals will use...
read more »Cybercriminals Next Targets: Short Term Dangers (part 1 of 2) - Where Cybercriminals Will Go Knowing what cybercriminals are targeting today is easy. Their attacks are loud, impactful, and have the...
read more »Farewell SHA-1 Hash Algorithm - Rest-in-Peace SHA-1. Like all security controls, they are only valuable for a certain period of time. SHA-1, a legacy hashing...
read more »Use Secure Erase Method to Securely Wipe SSDs - “So, how did the data leave the company?” He could feel the sweat running down the back of his neck...
read more »