Blog

  • DressCode Android Malware Finds Apparent Successor in MilkyDoor

    Apr 21, 2017, 09:14 AM by Ben Gane
    Mobile malware’s disruptive impact on enterprises continues to see an uptick in prevalence as mobile devices become an increasingly preferred platform to flexibly access and manage data. We recently found 200 unique...
    Full story
  • What Hollywood Just Taught Us About Ransomware

    Apr 21, 2017, 09:00 AM by Ben Gane
    Given the dramatic nature of cybercrime, it’s no surprise that Hollywood has been serving up a variety of plotlines and shows about hacking and cyber security. From Black Mirror to Mr. Robot, police procedurals and other dramas are teaching people just how dire cyber-attacks can be...
    Full story
  • Lawsuit Claims Bose Snoops on Users, Passes Data to Third Parties

    Apr 21, 2017, 08:48 AM by Ben Gane
    Audio electronics giant Bose faces data mining charges over accusations that it has been covertly collecting its customers’ personal information, including tastes in music and podcasts, in cooperation with a San Francisco-based aggregator...
    Full story
  • Been to one of these 1170 IHG hotels? Your credit card details may have been stolen by malware

    Apr 20, 2017, 09:04 AM by Ben Gane
    When a company starts a statement to customers with words describing how it “understands the important of protecting payment card data” you know that you’re about to hear some bad news… That’s precisely what InterContinental Hotels Group (IHG) has been forced to share...
    Full story
  • RawPOS: New Behavior Risks Identity Theft

    Apr 20, 2017, 08:54 AM by Ben Gane
    Despite being one of the oldest Point-of-Sale (PoS) RAM scraper malware families out in the wild, RawPOS (detected by Trend Micro as TSPY_RAWPOS) is still very active today, with the threat actors behind it primarily focusing on...
    Full story
  • 4 ways mobile devices still threaten your business

    Apr 20, 2017, 08:52 AM by Ben Gane
    Mobile devices have been commonly used in corporate environments for decades – bulky portable telephones, heavy laptops and PDAs. Then along came Apple and the smartphone, and soon everyone either had personal smartphone or...
    Full story
  • Forcepoint NGFW: bold claims, real results

    Apr 20, 2017, 08:38 AM by Ben Gane
    Many technology organizations make bold claims about ROI, but more often than not, there isn’t any data to back up those claims. We are happy to break the mold. Our Next Generation Firewall (NGFW) is designed to deliver high efficiency, availability and...
    Full story
  • Get behind Griff at CRN Fight Night 2017!

    Apr 19, 2017, 12:46 PM by Ben Gane
    On Thursday 25th May, the industries finest converge upon The Brewery in London for CRN Fight Night, and this year our very own Griff Akai has made it through the grueling qualifying process and will be representing e92plus in the ring.
    Full story
  • What’s The Next Wave in Wireless?

    Apr 19, 2017, 09:56 AM by Ben Gane
    I am going to introduce this topic by discussing 802.11ac Wave 2, as I believe this is a foundation for many of the new and exciting technologies that may soon hit the market. Even though AC Wave 2 may not be a new technology, it...
    Full story
  • Beware bogus emails from LinkedIn asking for your CV!

    Apr 19, 2017, 09:43 AM by Ben Gane
    LinkedIn users are being warned to be on their guard following a rise in reports of attacks being distributed via email designed to trick job seekers into sharing their personal details. Scammers have spammed out email messages posing as...
    Full story
  • Big data and machine learning: A perfect pair for cyber security?

    Apr 18, 2017, 09:38 AM by Ben Gane
    Online threats are emerging at a faster rate than ever. Between June and November of 2016, Malwarebytes discovered that almost 1 billion malware-based incidences occurred. These malicious programs are becoming more sophisticated...
    Full story
  • How to Detect Who Deleted a File from Your Windows File Servers

    Apr 18, 2017, 09:31 AM by Ben Gane
    Why It Is Important If a file on your server is deleted maliciously or by mistake, it can lead to losses of sensitive data and the inability of users to access the information they are intended to use, both of which may result in additional troubles for IT staff...
    Full story
  • Cradlecore: Ransomware source code for sale

    Apr 18, 2017, 09:25 AM by Ben Gane
    In a recent blog we talked about how the current ransomware pandemic continues to attract would-be cybercriminals to ransomware-as-a-service (RaaS) platforms. In this post we will look into a new piece of ransomware called "CradleCore"...
    Full story
  • Making Wi-Fi Simple – The Xirrus Way

    Apr 18, 2017, 09:02 AM by Ben Gane
    The world has seen six different Wi-Fi standards since 1997, a progression that started at 802.11a and has since brought us 802.11b, g, n, ac, Waves 1 and 2, and soon even more. This “alphabet soup” can seem endless,...
    Full story
  • How to better protect your Instagram account using two-step verification (2SV)

    Apr 18, 2017, 08:54 AM by Ben Gane
    As we all know, a complex and unique password for each of your web accounts goes only so far towards protecting you against hackers. Data breaches compromise people's login credentials all the time...
    Full story
  • Rumors of Demise Are Greatly Exaggerated

    Apr 13, 2017, 12:35 PM by Ben Gane
    About four years ago, I met with the wireless engineering lead of a large smartphone manufacturer. With advances in LTE technology on the horizon at the time, his position was that in 5 years or less, Wi-Fi would fade into oblivion...
    Full story
  • Microsoft patches Word zero-day vulnerability being actively exploited in attacks

    Apr 12, 2017, 09:32 AM by Ben Gane
    A few days ago I warned Windows users that an unpatched security hole in Microsoft Office was being used by malicious hackers to spread malware. The vulnerability was in all versions of Microsoft Word, and - as researchers...
    Full story
  • The Software Defined Data Center Needs Software Defined Security

    Apr 11, 2017, 09:29 AM by Ben Gane
    As Bogdan Botezatu wrote in his post Here Come Software-Defined Data Centers - What are the Security Implications? — the software defined data center is here to stay and is expected to grow from $25.61 billion in 2016 to...
    Full story
  • Dallas emergency system hacked; 156 sirens went off for 90 minutes

    Apr 11, 2017, 09:26 AM by Ben Gane
    Dallas went through a tornado scare after hackers compromised the emergency system and set off 156 sirens for approximately 90 minutes Friday night in what state officials named as one the largest known breaches of such a system...
    Full story
  • Microsoft Office zero-day being exploited to spread malware, but no patch available… yet

    Apr 11, 2017, 09:25 AM by Ben Gane
    Malicious hackers are exploiting an as-yet-unpatched security vulnerability in Microsoft Office products in attacks designed to secretly infect targeted computers with malware. The vulnerability is thought to be in all versions of Microsoft Office...
    Full story
Back
to Top