06 Apr
30 Mar

What Are Rootkits and Rootkit Attacks?

If you’re ever at the receiving end of a rootkit attack, then you’ll understand why they are considered one of the most dangerous cyber threats today.

read more

Share this
03 Feb

Mobile Malware: The Biggest Cyber Security Threat

It turns out we had no idea how popular and prevalent mobile malware is, and how much it is in use for surveillance and espionage campaigns. In reality, there are many active actors and advanced persistent threats we never knew existed.

read more

Share this
16 Dec

How to Tell If an App Is Malware?

There are a lot of apps you can download on Apple’s App Store and the Google Play Store. That’s obvious. What’s not so obvious is that even though both companies do a pretty good job of (mostly) catching malware apps, there are still plenty that sneak through because they just toe the line between scammy and barely helpful.

read more

Share this
18 Nov

How Malware Is Using Your PC for Cyber Attacks

It’s not just botnets that can hijack PCs for nefarious ends. Microsoft and Cisco’s Talos researchers have identified a new malware strain, Nodersok (or Divergent), that uses web apps to turn systems into proxies for malicious internet traffic.

read more

Share this
16 Sep

New Ransomware Attacks Are Terrifying

They just don’t quit, do they? Hackers and scammers are continuing to baffle security experts as they antagonize innocent folks across the internet. They’re continuously changing tactics and approaches in the hopes of evading authorities – which has the effect of unleashing new threats and obstacles that researchers and engineers are forced to overcome.

read more

Share this
22 Jul

Beware of Malware in Piracy Streaming Apps

Does the offer to “Never pay for cable again” sound tantalizing?

It shouldn’t. It should sound abhorrent, not only because of piracy is illegal and unfair to content creators, but also because researchers have found that pirated streaming devices are stuffed with malware and/or open the door for it to come streaming in.

read more

Share this
24 Jun

AI & Cyber Security: Which Protects Which?

For people with responsibility for corporate security – everyone from CIOs to CISOs and CROs – AI presents two types of risk that change the nature of their jobs. The first is that criminals, bad state actors, unscrupulous competitors, and inside threats will manipulate their companies’ fledgling AI programs. The second risk is that attackers will use AI in a variety of ways to exploit vulnerabilities in their victims’ defenses. The question remains – which protects which?

read more

Share this
03 Jun

Malware Is Hiding in Plain Sight

A noticeable shift in the methodology for developing malware is taking place, and it can’t go unaddressed. A few years ago, attackers’ primary objective was to avoid detection – second only to making a profit. But recently, these criminals have realized a critical truth: the longer they hold an infected endpoint, the more their profit increases.

read more

Share this

© 2017 Awontis. All rights reserved.