In the world of hacking, steganography ranks as one of the most difficult methodologies to detect. If you’re not familiar with the term, it is the practice of embedding executable code inside images, which makes it virtually impossible to detect. The reason is simple: Virus scanners are built around the idea of searching for text […]
Tag Archives: Malware and Virus Protection
There’s a new strain of ransomware making the rounds, and it’s a nasty piece of work. Called Phobos by its creators, the latest threat on the ransomware scene first made an appearance in December of 2018. While details are sketchy, what we know so far about it is grim indeed. Researchers at CoveWare have been […]
If you’re like many seasoned ‘Netizins, you probably rely on some type of VPN to help ensure your digital privacy. Unfortunately, based on research conducted by Simon Migliano, you could very well be wasting your time. Mr. Migliano is the head of research at Metric Labs and is a respected name in the industry. He and […]
Most reputable businesses don’t deal in illegal copies of commercial software, but there have been a few reported instances. There’s always the possibility that a cash-strapped individual that’s eager to do additional work from home might resort to installing a ‘cracked’ free copy of a program. Unfortunately, those who opt to go that route now […]
There’s a new malware threat in the MacOS ecosystem called OSX.LamePyre. If you haven’t heard of it yet, it belongs on your radar. At the moment, industry experts agree that it’s more of a crude work in progress. Unfortunately, the danger of crude works in progress is that the hackers continue to develop them, making […]
Bob Diachenko, the Director of Cyber Risk Research for Hacken, recently made a disturbing discovery. He found an ElasticSearch server open and vulnerable on the internet, without so much as a password to protect it. Unfortunately, the server was leaking a staggering 73GB of data and had a number of databases cached inside the server’s […]
In the world of data security, cryptocurrency mining software is often overlooked or discounted as a threat because it doesn’t do serious harm to the infected system. It bleeds off computing resources, putting them to work for the miners who control the software, working for them to solve complex cryptographic puzzles which generate revenue for […]
Over the course of the holiday season this year, more than half of the working adults in the United States will be traveling with one or more of their work devices. Unfortunately, only a tiny fraction of those fully appreciate the data security risks inherent in travel, which is a grim reality that could put […]