Attacks on enterprise security: Microsoft services as a weapon
Black Hat 2017 demonstrated that Microsoft enterprise solutions could be quite useful in attackers’ hands.
658 articles
Black Hat 2017 demonstrated that Microsoft enterprise solutions could be quite useful in attackers’ hands.
Global IT security problems like the recent Petya attack are of clear concern to large corpora-tions — but they affect common people as well.
Many users of Android devices sooner or later are tempted to root them. Here we discuss the advantages and disadvantages of having root permissions on Android devices — and if your device should be rooted at all.
Just a few hours ago, a global ransomware outbreak began, and it looks to be as big as the WannaCry story that broke not so long ago.
Advertising can sometimes be annoying — and sometimes it can be malicious. Businesses that make their money selling advertisements sometimes go too far trying to make sure you see their ads. Recently researchers found that one such business — a big digital-marketing agency — went as far as installing adware on 250 million computers running Windows and macOS all over the world.
Everyone, this is not a drill. It applies to all versions of Android, and at the time of this post’s publication, Google has not yet patched the vulnerability. By using this vulnerability, malicious actors can steal data including passwords; install applications with a full set of permissions; and monitor what the user is interacting with or typing on a keyboard on any Android smartphone or tablet. We repeat: This is not a drill…
By now, everyone has heard about the WannaCry ransomware attack. So far we have two posts about it: one with a general overview of what happened, and another with advice
A few days ago, an outbreak of the Trojan encryptor WannaCry started. It appears that the epidemic is global. We call it an epidemic since the extent of it is
Recent news about IP cameras being hacked and private footage sold unlawfully online has bestirred the Internet yet again. Such headlines are now unsurprising; however, one new case has a sensitive twist:
Last week, a coworker shared an interesting article with me from the BBC. It reported that Germans were being told to destroy a connected children’s toy because of hacking concerns.
In the movie Dude, Where’s My Car? (2000), viewers follow the humorous tale of two guys who partied a bit too hard trying to remember where they parked their car. We’ve all
The annual RSA conference will often overwhelm the average attendee. Between the great talks, the exhibition hall, the parties, and the city of San Francisco itself, there is a whole
One day in May 2016, Marion, a computer user from Germany, logged on to her home computer. She had no idea what lay in store for her. The first sign
People are downloading a new app, looking to get free access to Netflix accounts. What they’re actually getting is a malware strain called Netix that encrypts users’ data and demands $100 in
People post photos of their tickets online. Why shouldn’t they? Instagram alone contains thousands of images showing concert, airplane, and even lottery tickets. If everyone does it, why shouldn’t you?
One of the most important pieces of advice on cybersecurity is that you should never input logins, passwords, credit card information, and so forth, if you think the page URL
In April 2016 a young and ambitious trojan cryptor known by the name CryptXXX was released. It was distributed by the infamous Angler and Neutrino exploit kits. It’s creators certainly
This post is intended for people who either never heard of ransomware or knew about it but didn’t really pay attention. We will explain in practical, down-to-earth language what ransomware
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include PCs, smartphones,
Imagine that your computer suddenly shows you a disturbing message: “It’s FBI. Illegal content has been detected on your device. You’ll be arrested for 20 years and fined for $200,000
In February 2016, another new strain of ransomware hit the scene, its name akin to what many victims feel when they are hit with ransomware – Crysis. Over the past nine months,