Endpoint January 22, 2020 Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know 5 min read - Whether you're the CEO of a multinational corporation or a college kid setting up a Gmail account, proper cybersecurity hygiene should be as essential as understanding the rules of the road.
December 3, 2019 Weekly Security News Roundup: Dexphot Used Obfuscation, Fileless Tactics and Polymorphism 3 min read - Researchers detailed the multiple layers of obfuscation, fileless tactics and polymorphism techniques employed by the Dexphot malware campaign. Learn what else happened last week in security news.
August 5, 2019 HEXANE Threat Group Seen Targeting Industrial Control Systems < 1 min read - Researchers spotted a new activity group called HEXANE targeting industrial control systems (ICSs) in the Middle East.
October 12, 2018 iTranslator Malware Installs Two Drivers to Perform a MitM Attack 2 min read - Researchers from FortiGuard Labs discovered a malware sample called iTranslator that installs two drivers onto infected machines to perform man-in-the-middle (MitM) attacks.
Data Protection December 28, 2017 ADS-B and Aviation Cybersecurity: Should Passengers Be Concerned? 3 min read - ADS-B technology supplements pilots' situational awareness and provides valuable weather data, but it remains to be seen whether it will impact aviation cybersecurity and passengers' data privacy.
September 25, 2017 ISPs May Be Colluding With FinFisher Surveillance, According to Researchers 2 min read - FinFisher campaigns may be using ISPs to infect users' machines. This is the first time that ISPs have been detected as an infection mechanism.
July 6, 2017 Mozilla Still Finds Failures in Website Security, Survey Shows 2 min read - More than 90 percent of the top 1 million websites have failed to adopt adequate website security controls to protect against XSS, MitM attacks and more.
Endpoint June 21, 2017 More Mobile Apps Means More Man-in-the-Middle Attacks 2 min read - Mobile devices that contain unsanctioned apps are particularly vulnerable to man-in-the-middle attacks, especially when connected to unsecured Wi-Fi.
Application Security February 8, 2017 A Primer on IoT Security Risks 4 min read - IoT security risks include physical, network, software and encryption attacks that target the sensor, network and application layers of IoT systems.
December 5, 2016 Wake-Up Call: Millions of Android Users at Risk of MitM Attacks 2 min read - Security researchers at Zimperium zLabs found a vulnerability in the AirDroid app that could enable a cybercriminals to execute MitM attacks.