In case you have not notice, email security firm Cofense scanned emails from 35 million of its customers. Luckily, they used machine learning to do the analysis. Cofense’s report has these major conclusions: The numbers are a bit mind boggling. Among the statistics – A third of the phishing emails have a finance theme. This […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Google is very useful – we all know it. But useful for whom? Apparently hackers are setting up fake websites for popular free and open source software to promote downloads through ads and search engine marketing in Google search results. What the hackers do, among other things, is create fake domains that look like the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Why You Should Wear Contacts While on Video Conferences Researchers in Michigan and China have demonstrated their ability to read what is on your screen while you are on a video conference with 75% accuracy with text as small as 10 mm and a relatively low resolution 720 p camera. Credit: The Register Crooks are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Malware is like any other piece of software. Version one is usually pretty crappy – want vendors like to affectionately call a “minimum viable product”. Sometime minimal is loosely defined. In this case the malware is called GINP. The trojan has been in the wild since June. In the five months since, it has evolved. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Researchers Hack WPA 3 Again The WiFi Alliance has always keep their documents secret. The only way that you even get a copy of the specs is to become a member and that will cost you $5k-$20k a year, depending on your role. The same team that reported the bugs called Dragonblood found these new […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Asus Was Not Alone I wrote about the Asus supply chain attack in March (search for Asus in the blog search box). Attackers, somehow, compromised the development environment, injected malware and allowed the system to compile, digitally sign and distribute it through the software update process. Hundreds of thousands of clients were infected as a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]