LinkedIn's Bad Behaviors, The Data Exfiltration Gambit

LinkedIn’s Bad Behaviors, The Data Exfiltration Gambit

Bad Behaviors should not be tolerated... Behold, and examine, if you will, the data exfiltrated (in this case, the inventory of extensions installed in your broweser, and data contained therein) by Linkedin ...

Travel Tips to Keep You Safe from Cybercrime, Fraud & Identity Theft

You might be on vacation, but the malicious hackers and cybercriminals are not. They are always... The post Travel Tips to Keep You Safe from Cybercrime, Fraud & Identity Theft appeared first ...
machine learning for cybersecurity FI

How Machine Learning for Cybersecurity Can Thwart Insider Threats

While there are innumerable cybersecurity threats, the end goal for many attacks is data exfiltration. Much has been said about using machine learning to detect malicious programs, but it’s less common to ...
NFCdrip: Data Exfiltration Research in Near Field Communication

NFCdrip: Data Exfiltration Research in Near Field Communication

Near-field communication (NFC) is a set of protocols that enables two electronic devices to establish communication by bringing them very close together. Usually the devices must be within less than 4cm. Contactless ...
Hack.lu 2018: Mind The (Air)Gap - Erez Yalon and Pedro Umbelino

Smart Bulb Offers Light, Color, Music, and… Data Exfiltration?

Smart bulbs are widely known as a successful offering in home automation and IoT products, as they are internet-capable light bulbs that allow home users to customize the colors, schedule on and ...
NFCdrip: Watch the full out of band data exfiltration proof of concept

Meet NFCdrip – a New Security Concern for Air-Gapped Systems

Air-gapping means physically isolating a secure computer from unsecured networks, such as the public Internet or an unsecured local area network. The concept of air-gapping represents just about the maximum protection one ...
infosec

Sowbug Cyberespionage Group Hits South America, South Asia

Security researchers have identified a cyberespionage group that has been stealing data from policy and diplomatic organizations in South America and South Asia since at least 2015. “While cyberespionage attacks are often ...