Archive for November, 2018

While most people treat malware as just a piece of code, behind it is a human creating the content, and an entire ecosystem where the malicious code is changed to money. In the context of IoT botnets, we will be discussing Top 20 IoT Blackhat hackers and how they are impacting and shaping this illegal industry. Continue reading

A series of research projects, patent filings, and policy changes indicate that the Pentagon wants to use social media surveillance to quell domestic insurrection and rebellion.

Continue reading

Many of the most damaging hacks in recent history were only possible because someone failed to update software.

Continue reading

In an attempt to identify someone tricking a company into handing over cash, the FBI created a fake FedEx website, as well as deployed booby-trapped Word documents to reveal fraudsters’ IP addresses.

Continue reading

A big title game leaking more than a few days before its official release date is something that even people in the Nintendo Switch hacking and piracy scenestake note of. But this may be one of the biggest leaks yet: pirates have dumped the highly anticipated Super Smash Bros. Ultimate around two weeks before it’s scheduled to hit stores. Continue reading

Kaspersky Lab’s found evidence that a small spyware government contractor sells iOS malware, showing it may not be as rare as some people think.

Continue reading

Mass router hack exposes millions of devices to potent NSA exploit

More than 45,000 Internet routers have been compromised by a newly discovered campaign that’s designed to open networks to attacks by EternalBlue, the potent exploit that was developed by, and then stolen from, the National Security Agency and leaked to the Internet at large, researchers said Wednesday. Continue reading

Skype logo on an Android mobile device.

The US government killed off its net neutrality rules in June of this year, but that doesn’t mean no one is monitoring whether carriers are blocking or throttling online services. Continue reading

The Wehe team has been collecting continuous data about net neutrality violations since January of this year, thanks in large part to the more than 100,000 users of our Wehe app, who have collectively run 719,417 tests in 135 countries around the world. We use an extensively validated, peer-reviewed approach for determining whether Internet service providers (ISPs) are giving different bandwidth to different applications (e.g., limiting the video resolution on certain streaming video apps by limiting the bandwidth available). Continue reading

Crypto-Mining attacks have grown and evolved in 2018. Due to the rise in value and popularity of crypto currencies, hackers are increasingly motivated to exploit the CPU power of their victims’ machines for crypto-mining operations. Throughout the year, we have seen evidence of a significant surge in both reports and number of attacks. Despite a recent plateau in crypto currency values, the attack methods and techniques still continue to improve in ingenuity and effectiveness. Continue reading