People have become increasingly reliant on their mobile devices in recent years. Smartphones and tablets have revolutionized daily life. Unfortunately, such…
Month: August 2017
4 steps for improving employee trust while securing them
Earlier this month we held our quarterly Cybercrime Tactics and Techniques Q2 2017 webinar. This event gave thousands of security practitioners…
Explained: user agent
If you are the kind of person that uses different browsers or different devices to access websites, you may have noticed…
A week in security (August 14 – August 20)
Last week, we gave some security tips for parents and kids aimed at the new school term. We also took a…
Inside the Kronos malware – part 1
Recently, a researcher nicknamed MalwareTech famous from stopping the WannaCry ransomware got arrested for his alleged contribution to creating the Kronos…
Locky ransomware returns to the game with two new flavors
We recently observed a fresh malicious spam campaign pushed through the Necurs botnet distributing so far, two new variants of Locky…
Week in Security (August 7 – August 13)
Last week, we explained how security certificates work and how malware authors have used them to block security software from being…
Back to school cybersecurity tips for parents and kids
The time to start the new school term is just around the corner. And for parents, the excitement and anxiety may…
Cerber ransomware delivered in format of a different order of Magnitude
As a follow up to our study into the Magnitude exploit kit and its gate (which we profiled in a previous…
Explained: security certificates
As a result of my PowerShell series [1],[2],[3], where I used the handling of certificates as an example, mainly because I…