Home Digital Asset Security

Home Digital Asset Security

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a tiny metallic and glass panel, a bit like the Big Bang in reverse. For those young adults, whose ... Read More
Home Router…, or Trojan Horse?

Home Router…, or Trojan Horse?

Home Router…, Trojan Horse? The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store on our computers or mobile devices. Most of us are familiar with these “Trojan horse” viruses that can ... Read More
How CSPs can integrate security into their offering

How CSPs can integrate security into their offering

Telcos are uniquely situated to meet the challenge of providing cyber protection to consumers and small businesses, according to a new report by cybersecurity research firm TAG Cyber, written by Ed Amoroso, the former CISO of AT&T. It’s no secret that cyber threats are constantly on the rise. It’s also ... Read More
How to Prevent Connected Carjacking

How to Prevent Connected Carjacking

Most people reading this article will drive a connected car, which is essentially a car that can link to the Internet. GPS enables us to navigate through unknown territory. Smart radio selects our favorite music channels to play on our entertainments systems. And “really” smart cars are now driving us ... Read More
What is Fileless Malware?

What is Fileless Malware?

Fileless malware is a form of cyberattack where the malicious software that enters your computer system resides within volatile storage components such as RAM. It is distinguished from traditional memory-resident malware that generally required access to your hard disk before it hid itself away in memory. Due to its ability ... Read More
The Smart Home Turns On Scully | Season 11 Ep. 7 | THE X-FILES

FBI IoT Alert—But Have They Got It Right?

On August 2nd, 2018, the US Federal Bureau of Investigation (FBI) issued the following Public Service Announcement: “Cyber Actors Use Internet of Things Devices as Proxies for Anonymity and Pursuit of Malicious Cyber Activities” This announcement was one in a series of FBI alerts issued over the past three years ... Read More
Criminals Hacking CPUs to Mine Cryptocurrencies

Criminals Hacking CPUs to Mine Cryptocurrencies

Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing resources to mine cryptocurrencies. Cryptocurrency mining requires massive processing power to solve complex algorithms as part of the ... Read More

Secure Guardrails