When people discuss the Internet of Everything (IoE), it refers to the introduction of computing power and networking capabilities to previously “dumb” devices like television sets, cars, pedometers, and appliances.Ā Many believe that it is the next big thing in tech, andĀ it offers users a wide array of benefits, allowing them to save time, money, or…
Read MoreEvolution is a continuousĀ process, and nothing can exemplify the processĀ better in our industry than the threats we defend against. From simple pranks and nuisances, they’ve become thieves of information, violators of privacy, destroyers of reputations and even saboteurs of businesses, all for the sake of money. They’ve also become tools for activists and terrorists of…
Read MoreWith online banking becoming routine for most users, it comes as no surprise that we are seeing more banking malware enter the threat landscape. In fact, 2013 saw almost a million new banking malware variantsādouble the volume of the previous year. The rise of banking malware continued into this year, with new malware and even…
Read MoreMonitoring network traffic is one of the meansĀ for IT administrators to determine if there is an ongoing targeted attack in the network. Ā Remote access tools or RATs, commonly seen in targeted attack campaigns, are employed to establish command-and-control (C&C) communications.Ā Although the network traffic of these RATs, such as Gh0st, PoisonIvy, Hupigon, and PlugX, among…
Read MoreCross-platform threats can be dangerous, both at home and in the office. TheseĀ can ājumpā from one platform to another, or target all of them at the same time ā potentially infecting a userās entire network, or even a company’s network if left unchecked. The risk to critical data and system functionality, not to mention overall…
Read More