Security
Cloud Security: Automated and Self-Healing - Have you ever considered how much working with the cloud resembles the inner workings of the hereditary material in humans...
read more »Spora Adds a Wretched New Feature to Ransomware - Spora, a new ransomware variant recently discovered, has emerged with advanced features which will cause problems for security solutions working...
read more »Cyber Risks Compound with Technology Adoption - Just how reliant are we on computing infrastructure? Sometimes it takes just a little outage to get a taste of the...
read more »Missteps in Securing Autonomous Vehicles - Recently an autonomous car company highlighted some plans to keep their vehicles safe from hacking. Yet their plans won’t actually...
read more »3 Tips for Securing Home Cameras - Installing a home surveillance camera system can add great benefits but also may introduce new risks to privacy and network...
read more »Cyber Risks Compound with Technology Adoption - Just how reliant are we on computing infrastructure? Sometimes it takes just a little outage to get a taste of...
read more »Biggest Cybercriminal Ad-Fraud Rakes in Millions per Day - Methbot is a state-of-the-art ad fraud infrastructure, capable of hosting legitimate videos and serving them to 300 million fake viewers...
read more »Avalanche Cybercriminal Infrastructure Takedown - Congratulations to the multinational government agencies involved in the takedown of the Avalanche cybercriminal infrastructure! The U.S. Attorney’s Office, FBI,...
read more »PoisonTap USB can Hack a Locked PC in a Minute - PoisonTap is a fully automated proof-of-concept USB device which when connected to a locked PC, hacks the device and installs...
read more »Did You Forget to Patch Your IP Camera? - IP cameras are usually a purchase, install, and don’t-touch type of device. But in the current climate of cyber-attacks, they...
read more »