Compromising vital infrastructure: communication
In the series about vital infrastructure we look at communication. How vital is it? How is malware a threat and even how does malware show us the way to secure communication?
Merging Facebook Messenger, WhatsApp, and Instagram: a technical, reputational hurdle
Facebook’s plan to integrate secure messaging across Messenger, WhatsApp, and Instagram will demand technical know-how and a fierce commitment to user privacy.
Marriott breach impacts 500 million customers: here’s what to do about it
Marriott disclosed a large-scale data breach impacting up to 500 million customers who have stayed at a Starwood-branded hotel within the last four years.
The many faces of omnichannel fraud
There’s a new kind of fraud out there, and it’s after organizations that have embraced omnichannel, a strategy that focuses on improved user experience. We take a look at what omnichannel is, the kinds of fraud that can affect businesses using this approach, and how they can protect themselves—and their clients.
Malware analysis: decoding Emotet, part 2
In part two of our series on decoding Emotet, we analyze the PowerShell code flow and structure. We also reconstruct the command-line arguments—for fun!
A week in security (April 09 – April 15)
A roundup of the security news from April 09 – April 16, including fake updates, safe messaging, and Facebook spammers. And our quarterly CTNT report is out.
A week in security (March 26 – April 01)
A roundup of notable security news from March 26 to April 1, including data breaches, encryption, exploit kits, and more.
Encryption 101: Decryptor’s thought process
In this part of the encryption 101 series, we will begin wrapping it up by going into detail on a ransomware with weak encryption and walking through step-by-step the thought process of creating a decryptor for it.
A week in security (March 05 – March 11)
A roundup of notable security news from March 5 to 11, including another takedown of GeekHelp tech support scammers, a lame Android app, AI and ML in cybersecurity, Mac malware, and more.
Encryption 101: How to break encryption
Continuing on in our Encryption 101 series, we now look at what it takes to break encryption. In order for something as powerful as encryption to break, there needs to be some kind of weakness to exploit. That weakness is often a result of an error in implementation.