Latest Articles

Ammyy Admin compromised with malware again; World Cup used as cover

Ammyy Admin compromised with malware again; World Cup used as cover

Ammyy Admin compromised with malware again; World Cup used as cover

Website altered to serve a malware-tainted version of otherwise legitimate software with the global event in Russia acting as a smokescreen

Ondrej Kubovič11 Jul 2018


Polar Flow app exposes geolocation data of soldiers and secret agents

Polar Flow app exposes geolocation data of soldiers and secret agents

Polar Flow app exposes geolocation data of soldiers and secret agents

Reminiscent of the recent controversy surrounding the fitness-tracking app Strava, the tale involving Polar Flow shows how the sharing of seemingly innocuous – but potentially telltale – data can have significant privacy implications

Tomáš Foltýn11 Jul 2018


Certificates stolen from Taiwanese tech-companies misused in Plead malware campaign

Certificates stolen from Taiwanese tech-companies misused in Plead malware campaign

Certificates stolen from Taiwanese tech-companies misused in Plead malware campaign

D-Link and Changing Information Technologies code-signing certificates stolen and abused by highly skilled cyberespionage group focused on East Asia, particularly Taiwan

Anton Cherepanov09 Jul 2018


Attackers could use heat traces left on keyboard to steal passwords

Attackers could use heat traces left on keyboard to steal passwords

Attackers could use heat traces left on keyboard to steal passwords

The attack, called "Thermanator", could use your body heat against you in order to steal your credentials or any other short string of text that you have typed on a computer keyboard

Tomáš Foltýn06 Jul 2018


Secure Coding

Five tips for pentesters in iOS

Five tips for pentesters in iOS

Secure Coding

Five tips for pentesters in iOS

Recommendations for pentesters looking for security flaws in iOS applications made by developers

Denise Giusto Bilić05 Jul 2018


Digital Security

Going on vacation? Five things to do before you leave

Going on vacation? Five things to do before you leave

Digital Security

Going on vacation? Five things to do before you leave

You’ve set up an out-of-office auto-responder and packed your stuff, but have you done all of your “homework” before you rush out the front door for that well-deserved time off?

Tomáš Foltýn04 Jul 2018


Britain’s tax authority reports takedown of record 20,000 fake sites

Britain’s tax authority reports takedown of record 20,000 fake sites

Britain’s tax authority reports takedown of record 20,000 fake sites

Her Majesty's Revenue & Customs (HMRC) is “consistently the most abused government brand”, according to the National Cyber Security Centre (NCSC)

Tomáš Foltýn03 Jul 2018


Digital Security

The principle of least privilege: A strategy of limiting access to what is essential

The principle of least privilege: A strategy of limiting access to what is essential

Digital Security

The principle of least privilege: A strategy of limiting access to what is essential

The principle of least privilege is a security strategy applicable to different areas, which is based on the idea of only granting those permissions that are necessary for the performance of a certain activity

Miguel Ángel Mendoza02 Jul 2018


Social Media

How (over)sharing on social media can trip you up

How (over)sharing on social media can trip you up

Social Media

How (over)sharing on social media can trip you up

Profuse recounting of details from your life via social media may come at a price

Tomáš Foltýn29 Jun 2018


Social Media

Twitter bots, disassemble

Twitter bots, disassemble

Social Media

Twitter bots, disassemble

Social media giants announce new measures to tackle bots and abusers

Shane Curtis28 Jun 2018


World Cup squads briefed on cybersecurity best practices

World Cup squads briefed on cybersecurity best practices

World Cup squads briefed on cybersecurity best practices

The football associations of countries competing at Russia 2018 are taking no chances when it comes to cyber-related issues

Shane Curtis27 Jun 2018


Wi-Fi security gets a boost as WPA3 standard is launched

Wi-Fi security gets a boost as WPA3 standard is launched

Wi-Fi security gets a boost as WPA3 standard is launched

The new wireless security protocol is poised to make hacking Wi-Fi connections a whole lot harder

Tomáš Foltýn26 Jun 2018


Apt Activity Report
MDR Protection