If you look at the figures, you cannot deny that the eCommerce industry is steadily growing. More and more people are…
Month: March 2018
TLS 1.3 is nearly here
TLS stands for “Transport Layer Security” and it’s rather important. Why’s that? Oh, I’m glad you asked. Here’s me, yelling my…
The data breach epidemic: no info is safe
By now it’s obvious that data security technology and protocols haven’t kept pace with the needs of consumers. Even as more…
Exploit kits: Winter 2018 review
In the past, we used to do a blog series on exploit kits where we would periodically check in on the…
An in-depth malware analysis of QuantLoader
This guest post is written by Vishal Thakur, CSIRT/Salesforce. For more on Vishal, read his bio at the end of the…
10 ways to protect your Android phone
Android has been around for nearly a decade and has come a long way from its early wannabe iPhone days. New features,…
Encryption 101: Decryptor’s thought process
In the previous parts 1, 2 and 3 of this series, we covered the basics of encryption, walked through a live…
What Facebook’s Cambridge Analytica problem means for your data
As you may already know, there’s been a security meltdown at Facebook, thanks to a company called Cambridge Analytica and Donald…
Malicious cryptomining and the blacklist conundrum
When Coinhive first came out in September of 2017, it was fairly easy to identify websites using browser miners by looking…
A week in security (March 19 – March 25)
Last week, we looked at the growing problem of smartphone addiction, how link rot is continually slicing down portions of the…