Taking advantage of the celebration of the Day of the Programmer, we share some audit tools to evaluate the security of your code. September 13 is the 256th day of the year. These three digits may not mean anything to many people, but for those of us who work in different areas of computing it … More Programmer’s Day: Resources to audit your code
ESET researchers have discovered several third-party add-ons for the popular open-source media player Kodi being used to distribute Linux and Windows cryptocurrency-mining malware. If you use Kodi, you may have noticed that a popular, Dutch repository for third-party add-ons, XvBMC, was recently shut down upon copyright-infringement warnings. Following the shutdown, we discovered that the repository was … More Kodi add-ons launch cryptomining campaign
A domain name once left behind can catch up with you – by giving fraudsters access to a treasure trove of sensitive information. Cybercriminals can use an abandoned domain name to obtain all manner of private information belonging to the company that formerly owned the domain, as well as to its clients and employees, a researcher … More Abandoning a domain name can come back to bite you, research shows
Every now and then it’s good to remind readers of some basic security measures. Although we’ve written about it before, it’s time to look at public WiFi security again. There are several potential dangers when using public WiFi, ranging from privacy issues to cybercrime attacks. But most can be easily avoided by following these simple … More How to stay safe on public WiFi networks?
What impact has the new data protection directive had on businesses so far? This past weekend marks 100 days since General Data Protection Regulation (GDPR) went into effect, affecting businesses globally. Everyone who expected immediate headline-grabbing penalties must be disappointed. Although the EU Commision received complaints on companies such as Facebook, Google, Instagram and WhatsApp within hours of … More 100 days of GDPR
Far-fetched though it may sound, the answer is yes, according to researchers, who show that electrical grids and smart home appliances could make for a dangerous mix. Cybercriminals could rope internet-connected household appliances into a botnet in order to manipulate the demand side of the power grid and, ultimately, cause anything from local outages to large-scale blackouts, … More Could home appliances knock down power grids?
Malware from newly uncovered group PowerPool exploits zero-day vulnerability in the wild, only two days after its disclosure. On August 27, 2018, a so-called zero-day vulnerability affecting Microsoft Windows was published on GitHub and publicized via a rather acerbic tweet. It seems obvious that this was not part of a coordinated vulnerability disclosure and there was no … More PowerPool malware exploits ALPC LPE zero-day vulnerability