Research on how the healthcare sector has evolved as a preferred target for cybercriminals, how stolen records are monetized, what types of data are stolen, and how much they're sold for in the underground.
Cybercriminals can turn unsecure home routers into slaves for their botnets or even abuse them to steal banking credentials. Know about your router’s hidden weaknesses and the many ways you can defend your homes and businesses against these threats. Read more
The third part of the “Leaking Beeps” series discusses the different types of IT systems connected with unencrypted pages that can be used by attackers for reconnaissance or intelligence gathering. Read more
With a little SDR knowledge and a $20 USB dongle, attackers can read unencrypted pager messages from far away. This time, we look at what that means for nuclear plants, HVAC, manufacturers and other industries still using pagers. Read more
The sale of online gaming currencies, while not illegal, has been found to have cybercriminal ties. This research paper covers how cybercriminals use the profits from the trade of these virtual currencies to fund other attacks. Read more
With a little SDR knowledge and a $20 USB dongle, attackers can read unencrypted pager messages from tens of kilometers away. Who still uses pagers in this day and age? Healthcare facilities. Goodbye, PHI. Read more
This research paper highlights the flaws of the WPAD protocol, describes how it works, and why it is a serious security concern, especially under the altered conditions in today’s connected world. Read more