Results for "kelihos"

December 12, 2017 - Although often seen as an illegal cybercriminal tactic, the methodology behind fast flux is actually far from evil. So how is it being abused? Read on to learn more.

CONTINUE READING No Comments

September 5, 2016 - A compilation of notable security news and blog posts from August 28th to September 3rd. This week, we talked about browser-based fingerprinting; what was going on with the Mac app, Transmission; and a tech support scam that banked on an iPad error popping up on Windows systems.

CONTINUE READING No Comments

July 7, 2016 - Sinkholes and watering holes are two words not automatically associated with computer security, yet they are in use to describe two tactics that are used in this field.

CONTINUE READING No Comments

February 9, 2016 - Today is the 12th Safer Internet Day (SID), and the message remains: we must take security seriously.

CONTINUE READING No Comments

July 18, 2014 - Our honeypot captured an attack coming from AskMen.com in what appears to have been malicious code injected in their server.

CONTINUE READING No Comments

Select your language