humans

Hacking Humans

Go ahead and add insulin pumps and pacemakers to the ever-expanding list of computer-like-devices that contain bugs and are therefore vulnerable to exploit. That’s right, th...
Chrome

Say “Cheese” to your Google Chrome

A newly discovered vulnerability in a popular browser exposes how photos can be taken of unsuspecting users. Further proof of hackers’ inventiveness appeared last week in the form...
threats_title

Threats of the Digital World Q1 2013

We want you to be fully aware of the latest changes in the threat landscape. Our friends at securelist have compiled a quarterly report of digital threats and we’ve included...
rootkit

What is a Rootkit?

Rootkits have been around for nearly 20 years now, allowing attackers to get access to and steal data from users’ machines without being detected for long periods of time. The ter...