Home Digital Asset Security

Home Digital Asset Security

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a tiny metallic and glass panel, a bit like the Big Bang in reverse. For those young adults, whose ... Read More
Home Router…, or Trojan Horse?

Home Router…, or Trojan Horse?

Home Router…, Trojan Horse? The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store on our computers or mobile devices. Most of us are familiar with these “Trojan horse” viruses that can ... Read More
Top 12 Allot Blogs of 2018

Top 12 Allot Blogs of 2018

Top 12 Allot Blogs of 2018 With 2018 behind us, and 2019 picking up momentum, we thought you might be interested to see a list of the Top 12 Allot Blogs of 2018. We hope that you can find the time to read through this cyber compendium—you never know… you ... Read More
How to Prevent Connected Carjacking

How to Prevent Connected Carjacking

Most people reading this article will drive a connected car, which is essentially a car that can link to the Internet. GPS enables us to navigate through unknown territory. Smart radio selects our favorite music channels to play on our entertainments systems. And “really” smart cars are now driving us ... Read More
What is Fileless Malware?

What is Fileless Malware?

Fileless malware is a form of cyberattack where the malicious software that enters your computer system resides within volatile storage components such as RAM. It is distinguished from traditional memory-resident malware that generally required access to your hard disk before it hid itself away in memory. Due to its ability ... Read More
The Smart Home Turns On Scully | Season 11 Ep. 7 | THE X-FILES

FBI IoT Alert—But Have They Got It Right?

On August 2nd, 2018, the US Federal Bureau of Investigation (FBI) issued the following Public Service Announcement: “Cyber Actors Use Internet of Things Devices as Proxies for Anonymity and Pursuit of Malicious Cyber Activities” This announcement was one in a series of FBI alerts issued over the past three years ... Read More
Could IPv6 Result in More DDoS Attacks?

Could IPv6 Result in More DDoS Attacks?

With the growing popularity of IPv6 (Internet Protocol Version 6), so the possibility of this protocol providing a gateway for Distributed Denial of Service (DDoS) attacks has also increased. Developed by the Internet Engineering Task Force (IETF) to replace the forthcoming exhaustion of IPv4, IPv6 became a Draft Standard in ... Read More
Cyber Risks of Online Gaming

Cyber Risks of Online Gaming

As computer gaming companies rush to get their latest products onto the market, this haste may be providing a serious cybersecurity vulnerability. Prior to launching the next great computer game hit, online gaming companies have a choice—release their games on all platforms simultaneously, or release them in dribs and drabs ... Read More
Criminals Hacking CPUs to Mine Cryptocurrencies

Criminals Hacking CPUs to Mine Cryptocurrencies

Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing resources to mine cryptocurrencies. Cryptocurrency mining requires massive processing power to solve complex algorithms as part of the ... Read More