Defending Against Illicit Cryptocurrency Mining Activity
The popularity of cryptocurrency, a form of digital currency, is rising; Bitcoin, Litecoin, Monero, Ethereum, and Ripple are just a few types of the cryptocurrencies available. Though cryptocurrency is a common topic of conversation, many people lack a basic understanding of cryptocurrency and the risks…
New Malware Family Uses Custom UDP Protocol for C&C Communications
Security researchers have uncovered a new highly-targeted cyber espionage campaign, which is believed to be associated with a hacking group behind KHRAT backdoor Trojan and has been targeting organizations in South East Asia. According to researchers from Palo Alto, the hacking group, which they dubbed…
Wi-Fi WPA3 security is here, along with Easy Connect for IoT
Wi-Fi is pretty much the wireless technology that binds us all to the Internet. Given the prevalence of laptops and mobile devices and the costs of cellular data like LTE, Wi-Fi is still the preferred way to connect to the Internet both at home and…
Stay connected