Blog

A HomeKit vulnerability in the current version of iOS 11.2 has been demonstrated to 9to5Mac that allows unauthorized control of accessories including smart locks and garage door openers. Our unders… Source: Zero-day iOS HomeKit vulnerability allowed remote access to smart accessories including locks, fix rolling out
Today, at the Black Hat Europe 2017 security conference in London, two security researchers from cyber-security firm enSilo have described a new code injection technique called “Process Doppelgänging.” Source: “Process Doppelgänging” Attack Works on All Windows Versions
The subscription economy ushered in a new era of convenience, flexibility – and ransomware. Find out how Ransomware as a Service works and what’s driving its popularity. Source: Ransomware-as-a-Service: Commoditizing ransomware
An attacker can use Intel’s flaws to run malware that’s invisible to the operating system. Source: Intel: We’ve found severe bugs in secretive Management Engine, affecting millions | ZDNet
It isn’t clear how the spying driver gets installed, but if you have an HP machine, locating and deleting the offending “service” takes just a few minutes. Source: HP stealthily installs spyware called HP Touchpoint Analytics Client