It’s tough to remember all of the data breaches that happened in 2018. But when you look at the largest and…
Month: December 2018
Using the blockchain to create secure backups
“Oh no! I’ve got a ransomware notice on my workstation. How did this happen?” “Let’s figure that out later. First, apply…
Assessing the security of a portable router: a look inside its hardware, part deux
In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to…
A week in security (December 17 – 23)
Last week on Labs we looked at Fuchsia OS as a possible alternative for Android, explained all the reasons why cybercriminals…
Underminer exploit kit improves in its latest iteration
One of the most interesting exploit kits we track is also a bit of an elusive one, and as such does…
Smart speakers: Christmas treat or lump of coal?
Christmas is nearly upon us, and thoughts are perhaps turning to various digital presents of a “smart” nature. Home security, hubs,…
This online quiz is now confirmed to be a phishing scam
Ah, online quizzes. Many of us know that they can be somewhat dodgy and nonsense, really—but that doesn’t stop us from…
Christmas tech scams roundup
There’s a fair few Christmas tech scams floating around out there as 2018 winds up, and we thought it’d be a…
Flaw in Twitter form may have been abused by nation states
Twitter announced in a blog post on Monday that they discovered and addressed a security flaw on one of their support forms. The…
All the reasons why cybercriminals want to hack your phone
When people think of hacking, most imagine desktop computers, laptops, or perhaps even security cameras. However, in recent years, cybercriminals have…