Hackers Are Hiding Code In Images To Fool Mac Users

February 16th, 2019

In the world of hacking, steganography ranks as one of the most difficult methodologies to detect.

If you're not familiar with the term, it is the practice of embedding executable code inside images, which makes it virtually impossible to detect.

Watch Out For New Ransomware Called Phobos

February 9th, 2019

There's a new strain of ransomware making the rounds, and it's a nasty piece of work. Called Phobos by its creators, the latest threat on the ransomware scene first made an appearance in December of 2018.

While details are sketchy, what we know so far about it is grim indeed.

Many Android VPN Apps Contain Malware Or Exploitable Weaknesses

February 8th, 2019

If you're like many seasoned 'Netizins, you probably rely on some type of VPN to help ensure your digital privacy. Unfortunately, based on research conducted by Simon Migliano, you could very well be wasting your time.

Mr. Migliano is the head of research at Metric Labs and is a respected name in the industry.

Ransomware Can Make Installing Illegal Software More Risky

February 7th, 2019

Most reputable businesses don't deal in illegal copies of commercial software, but there have been a few reported instances. There's always the possibility that a cash-strapped individual that's eager to do additional work from home might resort to installing a 'cracked' free copy of a program.

This Mac Malware Takes Screenshots Of Your Computer

January 1st, 2019

There's a new malware threat in the MacOS ecosystem called OSX.LamePyre.  If you haven't heard of it yet, it belongs on your radar.

At the moment, industry experts agree that it's more of a crude work in progress.  Unfortunately, the danger of crude works in progress is that the hackers continue to develop them, making them a threat that gets worse over time.

Data On Millions Of Americans Leaked Through Open Server 

December 13th, 2018

Bob Diachenko, the Director of Cyber Risk Research for Hacken, recently made a disturbing discovery.  He found an ElasticSearch server open and vulnerable on the internet, without so much as a password to protect it.

Unfortunately, the server was leaking a staggering 73GB of data and had a number of databases cached inside the server's memory.

Uber Gets Hefty Fine From The EU For Data Breach 

December 11th, 2018

In recent years we've seen several companies suffer from hacks of various magnitudes. Over time, we've witnessed the growth of what could be described as best practices in terms of how to respond.

The typical arc goes something like this:

The hack is discovered.

Google Continues To Battle With Malware In Play Store

December 6th, 2018

In recent months, Google has taken steps to tighten up its processes so that fewer poisoned apps find their way into the Google Play Store.  In addition to that, the company has stepped up its efforts to ruthlessly track down and remove malicious apps whenever and wherever they are found.

You Should Be Worried About Cryptocurrency Mining Malware

December 3rd, 2018

In the world of data security, cryptocurrency mining software is often overlooked or discounted as a threat because it doesn't do serious harm to the infected system.

It bleeds off computing resources, putting them to work for the miners who control the software, working for them to solve complex cryptographic puzzles which generate revenue for the hackers.

Most Travelers Are Oblivious To Security Risks During Travel

November 29th, 2018

Over the course of the holiday season this year, more than half of the working adults in the United States will be traveling with one or more of their work devices.

Unfortunately, only a tiny fraction of those fully appreciate the data security risks inherent in travel, which is a grim reality that could put your company and its data at risk.