BlogAmid growing concern about foreign interference in the November elections, military hackers at the United States Cyber Command have started attacking the Trickbot botnet. In this short article, we’ll tell you what’s happening and why it matters for the elections.
What is the Trickbot botnet?
Trickbot is botnet malware: malware that can be used to create networks of infected computers and then coordinate their activity. Originally a banking Trojan, the malware has evolved over the past several years and can now be used to spread ransomware and other forms of malware. It …
October 12, 2020 •
4 min read
BlogThe annual Virus Bulletin security conference was held last week; as has been the case with so many other events this year, the proceedings were fully remote, leading the organizers to call the 2020 instalment of the conference “VB2020 localhost”.
October 8, 2020 •
7 min read
BlogIn this short article, we’ll introduce you to this emerging phenomenon, tell you how it works, and offer some thoughts about the future of privacy.
October 5, 2020 •
6 min read
BlogOctober is National Cybersecurity Awareness Month, and the National Cybersecurity Alliance has kicked things off by releasing some timely recommendations for 2020.
October 2, 2020 •
8 min read
BlogWith the United States threatening to make good on its promise to pull them from U.S. app marketplaces, popular apps TikTok and WeChat are granted a last-minute stay of execution.
September 23, 2020 •
6 min read
BlogIn this guide, we’ll tell you everything you need to know about the Mac’s new and improved OS!
September 21, 2020 •
8 min read
AppleApple held a special event this week to introduce several new devices and features. Here are some of the highlights:
Apple Watch Series 6
As expected, Apple used the special event to introduce the Apple Watch Series 6. Although a number of cosmetic and design changes were mentioned (including a new (PRODUCT)RED case, seamless watch bands, and more faces than ever before), the Apple Watch Series 6 was presented first and foremost as a next-gen health and wellness device.
The Apple Watch Series 6 has a number of new health features, but perhaps …
September 20, 2020 •
6 min read
BlogSecurity researchers have discovered a variant of Shlayer malware — an extremely common macOS threat — that appears to have circumvented Apple’s App Notarization process.
September 9, 2020 •
5 min read
BlogFederal judges in the United States are starting to push back against police requests for “geofence warrants”, citing constitutional concerns. In this short article, we’ll introduce you to the issue, tell you what it means for your privacy, and explain how you can limit the ability of the government (and others) to track you.
What is geofencing?
Broadly speaking, geofencing refers to the practice of creating a virtual boundary around a real-world physical area. The technique is often used by marketers and advertisers who want to show more relevant ads or offer …
September 8, 2020 •
7 min read
BlogThreat researchers are reporting that low-skilled Iranian hackers carried out a number of successful attacks against enterprise targets in June. The incident highlights the growing threat of off-the-shelf malware to businesses and individuals.
In this short article, we’ll tell you what happened, give you some background to the issue, and let you know what you can do to stay safe.
The incident
According to researchers at Singapore-based Group-IB, newbie hackers in Iran managed to penetrate the networks of a number of companies across the globe and infect their systems with Dharma ransomware. The …
August 31, 2020 •
6 min read
BlogSecurity researchers have discovered an interesting new variety of macOS malware that spreads by attacking Xcode projects. It’s called XCSSET, and in this article, we’ll tell you what you need to know about this unusual threat in order to stay safe.
What is XCSSET?
XCSSET is a suite of malicious components that spreads through infected Xcode projects.
Xcode is a tool used by app developers to write software for Apple platforms. An Xcode “project” simply refers to the repository of files, information, and resources that are used to build an app for deployment.
If …
August 18, 2020 •
5 min read
BlogDEF CON, a major annual event in the world of cybersecurity, was held just last week. This year, the organizers decided to go virtual, calling the event “DEF CON Safe Mode”.
There were a number of great talks and panels at the conference, and while some of them were quite technical, many also focused on topics likely to be of interest to a wide audience.
In what follows, we’ll offer some curated highlights from DEF CON Safe Mode that you may want to check out, along with links to the full video …
August 14, 2020 •
5 min read