Blog

“If there’s code that’s mining data and hiding itself on a computer without any way of removing it, that’s malware, plain and simple.” Source: Maker of sneaky Mac adware sends security researcher cease-and-desist letters | ZDNet
A researcher finds more than 460 models have the hidden software pre-installed. Source: HP laptops found to have hidden keylogger – BBC News
A HomeKit vulnerability in the current version of iOS 11.2 has been demonstrated to 9to5Mac that allows unauthorized control of accessories including smart locks and garage door openers. Our unders… Source: Zero-day iOS HomeKit vulnerability allowed remote access to smart accessories including locks, fix rolling out
Today, at the Black Hat Europe 2017 security conference in London, two security researchers from cyber-security firm enSilo have described a new code injection technique called “Process Doppelgänging.” Source: “Process Doppelgänging” Attack Works on All Windows Versions
The subscription economy ushered in a new era of convenience, flexibility – and ransomware. Find out how Ransomware as a Service works and what’s driving its popularity. Source: Ransomware-as-a-Service: Commoditizing ransomware