Latest epsiode - listen (or read) now!
Read moreSymbiote Backdoor in Linux
June 22 2022What makes Symbiote different from other Linux malware that we usually come across, is that it needs to infect other running processes to inflict damage on infected machines....
Read more
It took three years, but the Capital One cracker was convicted in the end. Don't get caught out in a data breach of your own!
Read moreM1 Chip Vulnerability
June 15 2022This is a new vulnerability against Apple’s M1 chip. Researchers say that it is unpatchable.
Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory, however, have created a novel...
Read more
Live demo, plain English, no sales pitch, just a chance to watch an attack dissected in safety. Join us if you can!
Read moreRemotely Controlling Touchscreens
June 2 2022Researchers have demonstrated controlling touchscreens at a distance, at least in a laboratory setting:
The core idea is to take advantage of the electromagnetic signals to execute basic touch...
Read more
Malware-Infested Smart Card Reader
May 26 2022Brian Krebs has an interesting story of a smart ID card reader with a malware-infested Windows driver, and US government employees who inadvertently buy and use them. But by all...
Read moreMore supply chain trouble - this time with clear examples so you can learn how to spot this stuff yourself.
Read moreResearchers have demonstrated iPhone malware that works even when the phone is fully shut down.
t turns out that the iPhone’s Bluetooth chip — which is key to making...
Read more
New Sophisticated Malware
May 4 2022Mandiant is reporting on a new botnet.
The group, which security firm Mandiant is calling UNC3524, has spent the past 18 months burrowing into victims’ networks with unusual stealth....
Read more
Recent Comments