Technology and the power of moral panic

We look at how technology and a splash of moral panic have made for strange companions down the years.

Read more

Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack

We take a look at some of the most famous (or infamous) hacking scenes from TV and movies and the cybersecurity lessons, if any, we can learn from them.

Read more

Securing the MSP: why they’re their own worst enemy

Behind each cyberattack on the MSP is typically a system left unpatched, asset management undone, security officer not hired, or board who sees investment in security as a cost center rather than a long-term investment.

Read more

A week in security (November 4 – November 10)

A roundup of important security news from the week of November 4–10, including the release of Malwarebytes 4.0, vendor email compromise, fake news, robocalls, and more.

Read more

15,000 webcams vulnerable to attack: how to protect against webcam hacking

We take a look at the ever-present threat of webcam hacking, and what you can do to avoid being caught out.

Read more

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

When penetration testing for an organization, what OSINT tactics can researchers employ? We discuss how hacking with AWS buckets can provide more recon data and uncover any leaks.

Read more

Cellular networks under fire from Soft Cell attacks

We break down the recently revealed attacks on telco operators around the globe, targeting specific high-value individuals.

Read more

Video game portrayals of hacking: NITE Team 4

We take a look at a game aimed at giving players the most realistic interpretation of hacking possible. How well does it stack up to the real thing?

Read more

Skimmer acts as payment service provider via rogue iframe

Even e-commerce sites that do not take payment information themselves can be abused by crooks. In this post, we show how a web skimmer is able to inject an artificial iframe into the checkout page to prompt users for their credit card information. Victims will only realize something’s not right when they are redirected to the real (and external) payment form.

Read more

A week in security (May 13 – 19)

A roundup of security news from May 13–19, including ransomware attacks on the upswing, website hacking, pseudo-VPNs, bloatware, and more.

Read more

Select your language