Bitcoin! Black gold! Texas tea! Only one of these is currently worth ridiculous amounts of money (and technically numbers two and…
Month: December 2017
A state of constant uncertainty or uncertain constancy? Fast flux explained
Last August, WireX made headlines. For one thing, it was dubbed the first-known DDoS botnet that used the Android platform. For…
How cryptocurrency mining works: Bitcoin vs. Monero
Ever wondered why websites that are mining in the background don’t mine for the immensely hot Bitcoin, but for Monero instead?…
A week in security (December 04 – December 10)
Last week on the blog, we looked at a RIG EK malware campaign, explored how children are being tangled up in…
Napoleon: a new version of Blind ransomware
The ransomware previously known as Blind has been spotted recently with a .napoleon extension and some additional changes. In this post,…
Interesting disguise employed by new Mac malware HiddenLotus
On November 30, Apple silently added a signature to the macOS XProtect anti-malware system for something called OSX.HiddenLotus.A. It was a…
How we can stop the New Mafia’s digital footprint from spreading in 2018
Cybercriminals are the New Mafia of today’s world. This new generation of hackers are like traditional Mafia organizations, not just in…
Use TeamViewer? Fix this dangerous permissions bug with an update
TeamViewer, the remote control/web conference program used to share files and desktops, is suffering from a case of “patch it now.”…
Internet of Things (IoT) security: what is and what should never be
The Internet has penetrated seemingly all technological advances today, resulting in Internet for ALL THE THINGS. What was once confined to…
How to harden AdwCleaner’s web backend using PHP
More and more applications are moving from desktop to the web, where they are particularly exposed to security risks. They are…