Blog

Today, at the Black Hat Europe 2017 security conference in London, two security researchers from cyber-security firm enSilo have described a new code injection technique called “Process Doppelgänging.” Source: “Process Doppelgänging” Attack Works on All Windows Versions
The subscription economy ushered in a new era of convenience, flexibility – and ransomware. Find out how Ransomware as a Service works and what’s driving its popularity. Source: Ransomware-as-a-Service: Commoditizing ransomware
An attacker can use Intel’s flaws to run malware that’s invisible to the operating system. Source: Intel: We’ve found severe bugs in secretive Management Engine, affecting millions | ZDNet
It isn’t clear how the spying driver gets installed, but if you have an HP machine, locating and deleting the offending “service” takes just a few minutes. Source: HP stealthily installs spyware called HP Touchpoint Analytics Client
Many technologists think blockchains can revolutionize how we keep track of our identities. Source: Blockchains are poised to kill off passwords, once and for all