In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.
News of attacks come and go so fast, sometimes it’s hard to keep track. We’ve done the work for you, sifting through scores of reports to bring you a compilation of digital crimes that are on the rise and what you can do to protect yourself.
The first Mac malware of 2017 was discovered by an IT admin, who spotted some strange outgoing network traffic from a particular Mac. This led to the discovery of a new piece of malware unlike anything I’ve seen before and the first new piece of malware for the Mac in 2017.
If you follow cybersecurity news, you may have heard of the latest Linux exploit referenced under CVE-2016-5195, which has been dubbed Dirty COW. The name is derived based on the exploitation of the copy-on-write (COW) mechanism in Linux.
What is UEFI and its predecessor the MBR? What challenges are there to get a dual boot environment with an alternative operating system?
We often hear about botnets (networks of infected computers) being used to send out spam, perform Distributed Denial of Service attacks or other nefarious activities by the bad guys. Well, an unidentified researcher thought there was much more that could be done with a botnet and took on an unprecedented mission to map out the…