A recent surge in tech support scams show that this particular method of coercion is still thriving. New tactics and avenues of attack deceive people who are more familiar with the traditional techniques. Find out how to spot and manage these scams. Read more
By analyzing ICS-CERT advisories and the vulnerabilities provided by our network of world-wide researchers working with the Zero Day Initiative program, it is possible to get an understanding of the attack surface that is exposed by HMI solutions. Read more
This research paper highlights the flaws of the WPAD protocol, describes how it works, and why it is a serious security concern, especially under the altered conditions in today’s connected world. Read more
To compete in today’s market driven global economy, businesses opt for control systems that automatically manage processes. ICS enables efficiency, but are connected, heightening threat exposure and corresponding business risks.
Various business websites were recently hijacked to deliver crypto-ransomware to visitors. Why do attackers repeat the cycle of compromising legitimate websites via exploit kits, malware and vulnerable software? Read more
The inevitable rise of IoT homes is driving a market hungry for convenience and efficiency, but this trend is also bringing up serious concerns. Who is ultimately responsible for securing IoT homes: buyers or manufacturers? Read more