• img December 11, 2017

Will IoT botnets catapult the industry toward security regulation in 2018?

Attackers demonstrated the power of an IoT-fueled botnet in 2016 when the Mirai botnet took down major websites like Reddit, Twitter and GitHub. Despite the damages, no significant changes to the IoT industry occurred. As a matter of fact, consumers continue to purchase and deploy IoT devices with little care outside the guarantee that the […]

Read More
  • img December 11, 2017

A layered approach to modern identity

The way we work is evolving. Traditional desktop computers and laptops are slowly giving way to the mobile device. From smartphones to tablets, a growing number of employees are embracing the flexibility that accompanies such devices. In fact, 55 percent of all email was opened on mobile devices from May 2017 to April 2017 – […]

Read More
  • img December 11, 2017

Unidentified Leak Paths Led to Successful Hack of South Korean Military by North Korea – Part I

According to ABC News, the recent breach of South Korean classified systems holding joint South Korean-US military files were attributed to missed leak paths between the intranet and internet. These leak paths were used by North Korean hackers, operating out of China, to steal classified data. North Korea used malware that originally was hidden inside a […]

Read More
  • img December 10, 2017

Week in review: Ransomware’s next stop, NiceHash hack, and why phishers love HTTPS

Here’s an overview of some of last week’s most interesting news and articles: Bitcoin traders beware: Fake trading bot offer delivers RAT The malicious offer comes via email: a free trial of Gunbot, a new bitcoin trading bot developed by Gunthy. Global security spending to reach $96 billion in 2018 Organizations are spending more on […]

Read More
  • img December 08, 2017

Android Flaw Poisons Signed Apps with Malicious Code

An Android vulnerability called Janus allows attackers to inject malicious code into signed Android apps.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/android-flaw-poisons-signed-apps-with-malicious-code/

Read More