August 27, 2014 Hacking the Hacker How We Cracked the Code on DirCrypt Ransomware Ransomware has become a top computer ...
August 23, 2014 Mobile Security Weekly – Are iOS and Android full of holes or is it just Gamma Group? Questions continue to be raised, both by users and now governments, regarding the safety of ...
August 16, 2014 Mobile Security Weekly – Bringing the Hammer Down on Mobile Threats The world of mobile security is constantly absorbing and adopting new trends. This week’s ...
August 16, 2014 Practical Attacks Against VDI and Augmenting Mobile Security The following content “Practical Attacks Against VDI and Augmenting Mobile Security” was part of a ...
August 13, 2014 Are Malicious Configuration Profiles iOS’ Achilles Heel? As part of our ongoing efforts to protect our clients from all types of mobile ...
August 12, 2014 Mobile Security Weekly – Android Threats Stack Up On the heels of BlackHat USA, perhaps it’s hardly surprising that this week has been ...
August 11, 2014 Check Point Protects from the HAVEX Malware Targeting ICS/SCADA Systems Dragonfly Cyber Espionage campaign overview Havex is a Remote Administration Tool (RAT) used recently by ...
August 11, 2014 GOZ – Is it game over, Zeus? Overview Zeus is a highly sophisticated family of Trojans that seeks to steal banking information ...
August 11, 2014 Protecting computers from the damages of RAMDO Click Fraud Trojan Details Ramdo is a family of Trojan horses which performs click fraud. This type of ...
August 11, 2014 Don’t Become the Next Code Spaces: Learn best practices for using cloud services securely Overview Code Spaces, which offered source code repositories and project management services hosted in Amazon’s ...