AT&T Stops Attaching Tracking Files to Mobiles

Last Friday, mobile operator AT&T Mobility announced that it had stopped using hidden codes embedded in data that is transmitted from customers’ smartphones. Score a victory for privacy.

AT&T Tracking FIles
Wait… AT&T was tracking you with hidden codes? The secret codes in tracking files, known as ‘header enrichment,’ consist of…
Read More

How to cure Location Fatigue

When advanced smartphones first started to hit the market, one of the integrated pieces of technology that people were most excited about was GPS. Now you were able to easily get directions, find interesting things around you, and check in to places where you were.

location-fatigue
An overwhelming flood of apps that used location data became available, and down to this day, new ones are continuing…
Read More

Cuckoo Sandbox vs. Reality

The problem: Having to analyse several hundred thousand potential malware samples every day. The solution: Building a scalable system that has detailed information about sample behavior and functionality with the help of Cuckoo Sandbox.

malware-analysis
Problem We get several hundred thousand potential malware samples every day, a number that increased when we began to detect…
Read More

Evolutionary Antivirus

Every now and then a quantum leap occurs. This time, it protects us all.

evolutionary-antivirus
First evolution The technologies antivirus companies use to detect malware evolve over time to meet the ever-changing threat landscape. The…
Read More

Shortcut Express to Infected & Phishing Websites

We’ve all encountered shortened URLs – so practical on Twitter and other social media platforms, yet potentially harmful when hiding a malicious website. For a look into the world of shortened URLs, and for security recommendations on handling them, check out this post!

URL shortener
URL shorteners are a relatively new Internet service. As many social services on the Internet impose character limitations (Twitter is…
Read More

Official specifications are not enough

Before a file is analyzed in depth, a few technical questions must be answered. It may sound easy to answer them in theory, but it might be very difficult in practice, because official specifications are not enough.

specsiceberg
  Before one can tell if a file is malicious or clean, it's important to determine the file type, and…
Read More

Why blocking advertisements matters

Once upon a time, when online advertisement was not even allowed, you would at least have been mildly laughed at when saying it was going to be a nine figure business.¹ Nowadays the use of web ads and ad blockers has become second nature. Besides visual relaxation, there are other good reasons to keep advertisements off your computer.

online-ads
(more…)
Read More

Protect your blog

Attacks against blogs are unstopping: they are typically the low-hanging fruits on the Web. Here are a few tips to help you to protect your blog.

Castles' layouts
Castles have very regular (not to say, boring!) layouts. Why is that? Why don't they have any fancy layout ?…
Read More

Malicious Office macros are not dead

You could think that malicious Office macros are a thing of the past. They are not a major threat anymore, but they still represent a potential risk for unsuspecting users.

German warning: Macros have been disabled - Enable Content
You could think that malicious Office macros are a thing of the past. They are not a major threat anymore,…
Read More
1 2 3 8