Blog

  • From
  • to

Cyberwarfare in the Media: The Evolution of Hollywood Hackers

On July 8, 2016, Alex Gibney (the man who directed We Steal Secrets: The Story of WikiLeaks and Enron documentary The Smartest Guys in the Room) released his latest documentary, Zero Days. At a time when even anti-virus programs themselves are vulnerable to attacks, the Zero Days documentary uncovers a much deeper level…

July 29, 2016

Sarah Vanier

Critical Features of Next-Generation Endpoint Security, Part Three: Dynamic Exploit Detection

For information security personnel, exploits represent a bit of a catch-22. On the one hand, you can basically guarantee endpoint security, and negate almost one hundred percent of all exploits, by keeping your systems up-to-date. On the other hand, that’s far easier said than done. Think of all the systems…

July 28, 2016

Scott Gainey

Ransomware Cyber Guarantee - Put your money where your mouth is.

We support transparency. We hate FUD. Security vendors have been doing the “fear” sell for forever now, making bombastic claims and promising to make you virtually bulletproof – but with nothing to show for other than marketing claims. We believe it is time to stand behind what you sell. We…

July 26, 2016

Tomer Weingarten

Protecting Endpoints to Prevent Shadow IT

“Collectively, unapproved cloud, SaaS, and software applications present a problem known as Shadow IT. Much has been written about the huge hurdles Shadow IT has thrown in the path of governance, compliance, and data-loss prevention. These are all serious problems, but Shadow IT presents another serious risk—it creates another open…

July 25, 2016

Sean Roth

Shut up snitch! - reverse engineering and exploiting a critical Little Snitch vulnerability

Shut up snitch! - reverse engineering and exploiting a critical Little Snitch vulnerability Little Snitch was among the first software packages I tried to reverse and crack when I started using Macs. In the past I reported some weaknesses related to their licensing scheme but I never audited their kernel…

July 22, 2016

Pedro Vilaca

Mainstream Malware for Linux?

While ransomware has been an extremely popular tactic for criminals on Windows over the past year, it has been seen spreading to other operating systems. Android devices have seen some attempts to use ransomware and even OS X has had a few variants of ransomware be seen in the news.…

July 21, 2016

Tim Strazzere

According to Experts, Linux Security is Still Subpar

Ubuntu 16.04 just dropped, and with it, a new security feature known as Snaps, which is supposed to simplify the secure development process. Canonical touts Snaps as the best way to keep desktop applications from stealing data, but according to Linux expert Matthew Garret, that's simply not the case. Linux…

July 20, 2016

Sarah Vanier

Pokemon GO Uses "Security Problems!" It's Super Effective!

The past week has evoked an unfamiliar sight in many of the country's public areas: Hundreds of young adults—heads down, eyes glued to their phones—wandering through public parks in search of Pokemon. In many ways, Pokemon GO represents a seismic societal shift. No other game has really captured the potential…

July 18, 2016

Sarah Vanier

NASCAR Team’s Ransomware Attack Shows that Malware is a Danger to SMBs

More is at risk, right now, than sick patients. While hospitals have overwhelmingly been the target of ransomware attacks in the headlines—Methodist Hospital in Henderson, Kentucky, which got hit by Locky ransomware in March, plus three other California hospitals which got hit in that same month, and Hollywood Presbyterian hospital…

July 15, 2016

Scott Gainey

In a Colossal Irony, Popular Antivirus Programs Are Themselves Vulnerable to Breach

Malicious programs commonly use more benign applications as a vector for their attacks. A deadly variant of Blackenergy was able to infect users’ computers by taking advantage of vulnerabilities in MS Word, for example. RawPOS disguises itself as an unassuming Windows process. Other programs might make use of your browser,…

July 14, 2016

Sarah Vanier

1 2 3 8