Turning failure into success
As a security professional it’s hard to say ‘I told you so’ but as far back as 2009-2010 Webroot was saying that the endpoint market was broken and that a new approach to stopping malware infections on...
View ArticleAnother Hacking Team exploit that is CRITICAL for ALL Windows systems –...
It just doesn’t seem to end with all the exploits being revealed by the Hacking Team dump earlier this month. This vulnerability could allow remote code execution if a user opens a specially crafted...
View ArticleMacs are immune to malware? Yet another Apple exploit…
Yesterday information was published online through www.theregister.co.uk discussing an exploit that was discovered in the Mac OSX 10.10 Yosemite operating system. The discovered exploit allows a user...
View ArticleEncryptor RaaS (Ransomware as a Service)
A new ransomware has emerged and its very similar to tox as it is created for hackers to easily design encrypting ransomware payloads to distrube from their botnets. Since the creator of Tox was...
View ArticleBack to School Means Back to Security
Not a week goes by where we are not hearing about, reporting on, or providing comment to another major breach. From big box chains to mom and pop shops, it seems to be a constant source of news. Beyond...
View Article10 Tips To Survive Black Hat 2015
Black Hat USA is next week, and with it will come some of the biggest hacker news of the year. From cars to mobile devices, all the way to the hotel HVAC, nothing is really out of the reach of the...
View ArticleSecurity in the Rough
This week marks the 18th annual BlackHat USA conference where many of the world’s brightest security minds come together to discuss and showcase techniques capable of defeating and compromising a wide...
View ArticleRecap of Black Hat 2015, Day 1
This is hacker week. Well, not really that officially, but with Black Hat USA and DefCon happening in Vegas, the biggest collection of black and white hat hackers have come together with experts and...
View ArticleWhy are we using biometrics as passwords?
After seeing a great presentation on newly discovered biometrics/fingerprint vulnerabilities (“Fingerprints On Mobile Devices: Abusing And Leaking”, by Tao Wei and Yulong Zhang) at Blackhat 2015, I...
View ArticleWhat Now After Black Hat 2015?
It’s good to see that at last some alternatives to traditional AV endpoint protection are gaining traction. A lot of the questions I was asked at the show were to compare Webroot to other exhibitors...
View ArticleAdBlock Plus exploit puts OSX users at risk
A visit to the Apple store will give any consumer a false sense of security, you will be told that by buying a Mac you are safe from threats and malware. I have even been told this even after I explain...
View ArticleMacs are immune to malware? Yet another Apple exploit…
Yesterday information was published online through www.theregister.co.uk discussing an exploit that was discovered in the Mac OSX 10.10 Yosemite operating system. The discovered exploit allows a user...
View ArticleEncryptor RaaS (Ransomware as a Service)
A new ransomware has emerged and its very similar to tox as it is created for hackers to easily design encrypting ransomware payloads to distrube from their botnets. Since the creator of Tox was...
View ArticleBack to School Means Back to Security
Not a week goes by where we are not hearing about, reporting on, or providing comment to another major breach. From big box chains to mom and pop shops, it seems to be a constant source of news. Beyond...
View Article10 Tips To Survive Black Hat 2015
Black Hat USA is next week, and with it will come some of the biggest hacker news of the year. From cars to mobile devices, all the way to the hotel HVAC, nothing is really out of the reach of the...
View ArticleSecurity in the Rough
This week marks the 18th annual BlackHat USA conference where many of the world’s brightest security minds come together to discuss and showcase techniques capable of defeating and compromising a wide...
View ArticleRecap of Black Hat 2015, Day 1
This is hacker week. Well, not really that officially, but with Black Hat USA and DefCon happening in Vegas, the biggest collection of black and white hat hackers have come together with experts and...
View ArticleWhy are we using biometrics as passwords?
After seeing a great presentation on newly discovered biometrics/fingerprint vulnerabilities (“Fingerprints On Mobile Devices: Abusing And Leaking”, by Tao Wei and Yulong Zhang) at Blackhat 2015, I...
View ArticleWhat Now After Black Hat 2015?
It’s good to see that at last some alternatives to traditional AV endpoint protection are gaining traction. A lot of the questions I was asked at the show were to compare Webroot to other exhibitors...
View ArticleAdBlock Plus exploit puts OSX users at risk
A visit to the Apple store will give any consumer a false sense of security, you will be told that by buying a Mac you are safe from threats and malware. I have even been told this even after I explain...
View Article