Blog

The subscription economy ushered in a new era of convenience, flexibility – and ransomware. Find out how Ransomware as a Service works and what’s driving its popularity. Source: Ransomware-as-a-Service: Commoditizing ransomware
An attacker can use Intel’s flaws to run malware that’s invisible to the operating system. Source: Intel: We’ve found severe bugs in secretive Management Engine, affecting millions | ZDNet
It isn’t clear how the spying driver gets installed, but if you have an HP machine, locating and deleting the offending “service” takes just a few minutes. Source: HP stealthily installs spyware called HP Touchpoint Analytics Client
Many technologists think blockchains can revolutionize how we keep track of our identities. Source: Blockchains are poised to kill off passwords, once and for all
Google is applying new research to better protect users. Source: Google says hackers steal almost 250,000 web logins each week – Nov. 9, 2017