Internet of Things


492 articles

Malware

The odd, 8-year legacy of the Conficker worm

The odd, 8-year legacy of the Conficker worm

Malware

The odd, 8-year legacy of the Conficker worm

The Conficker worm was huge news when it emerged towards the end of 2008, exploiting millions of Windows devices. Today, it remains one of the most pervasive malware families around the globe.

Editor21 Nov 2016


Malware

Sednit: A very digested read

Sednit: A very digested read

Malware

Sednit: A very digested read

This feature offers a very digested read of ESET's trilogy of research papers on Sednit, one of the most notorious groups of cyberattackers in the world.

Editor11 Nov 2016


Internet of Things

Secure your router: How to help prevent the next internet takedown

Secure your router: How to help prevent the next internet takedown

Internet of Things

Secure your router: How to help prevent the next internet takedown

Secure your router, says ESET's Lysa Myers. It can help protect all of your connected devices while they are in your home.

Lysa Myers08 Nov 2016


Malware

How to do an APK Analysis Using AppMon

How to do an APK Analysis Using AppMon

Malware

How to do an APK Analysis Using AppMon

There are a great many tools available to help quickly analyze the behavior of mobile malware samples. In the case of Android, one such app is AppMon.

Denise Giusto Bilić07 Nov 2016


Malware

Flashback Tuesday: The Morris Worm

Flashback Tuesday: The Morris Worm

Malware

Flashback Tuesday: The Morris Worm

On November 2nd 1988, the Morris Worm was released, bringing the internet to an effective standstill. It was a seminal moment in internet history.

Editor02 Nov 2016


Malware, Mobile Security

A history of mobile malware from Cabir to SMS Thief

A history of mobile malware from Cabir to SMS Thief

Malware, Mobile Security

A history of mobile malware from Cabir to SMS Thief

As we continue to do more things with our smartphones, the threat posed by mobile malware increases. Here's a short history of its development.

Editor01 Nov 2016


Internet of Things

Trick or threat? How zombie IoT devices surprised the internet

Trick or threat? How zombie IoT devices surprised the internet

Internet of Things

Trick or threat? How zombie IoT devices surprised the internet

It seems the current DDoS tactics from cybercriminals is to gain control over millions of IoT devices and direct their power towards any target they choose.

Ondrej Kubovič31 Oct 2016


Internet of Things

The Hive Mind: When IoT devices go rogue

The Hive Mind: When IoT devices go rogue

Internet of Things

The Hive Mind: When IoT devices go rogue

IoT devices, while extremely useful for simplifying various mundane aspects of everyday life, also offer criminals a new attack platform: your appliances.

Michael Aguilar26 Oct 2016


Internet of Things

10 things to know about the October 21 IoT DDoS attacks

10 things to know about the October 21 IoT DDoS attacks

Internet of Things

10 things to know about the October 21 IoT DDoS attacks

On Friday October 21st, a series of IoT DDoS attacks caused widespread disruption of legitimate internet activity in the US. Stephen Cobb investigates.

Stephen Cobb24 Oct 2016