Last Friday, mobile operator AT&T Mobility announced that it had stopped using hidden codes embedded in data that is transmitted from customers’ smartphones. Score a victory for privacy.
When advanced smartphones first started to hit the market, one of the integrated pieces of technology that people were most excited about was GPS. Now you were able to easily get directions, find interesting things around you, and check in to places where you were.
The problem: Having to analyse several hundred thousand potential malware samples every day. The solution: Building a scalable system that has detailed information about sample behavior and functionality with the help of Cuckoo Sandbox.
Every now and then a quantum leap occurs. This time, it protects us all.
We’ve all encountered shortened URLs – so practical on Twitter and other social media platforms, yet potentially harmful when hiding a malicious website. For a look into the world of shortened URLs, and for security recommendations on handling them, check out this post!
Has one of your social media accounts been hacked? How would you know if it was – and more importantly, what should you do? Read on for actionable tips to tackle these thorny questions heads on!
Before a file is analyzed in depth, a few technical questions must be answered. It may sound easy to answer them in theory, but it might be very difficult in practice, because official specifications are not enough.
Once upon a time, when online advertisement was not even allowed, you would at least have been mildly laughed at when saying it was going to be a nine figure business.¹ Nowadays the use of web ads and ad blockers has become second nature. Besides visual relaxation, there are other good reasons to keep advertisements off your computer.
Attacks against blogs are unstopping: they are typically the low-hanging fruits on the Web. Here are a few tips to help you to protect your blog.
You could think that malicious Office macros are a thing of the past. They are not a major threat anymore, but they still represent a potential risk for unsuspecting users.