2016 Trend Micro Security Predictions: The Fine Line

Acrobat 2016 Trend Micro Security Predictions: The Fine Line
Author: Trend Micro Security Team
Source: http://www.trendmicro.com/
Overview: Every year, the triumphs and failures reflected in cyber security stories not only leave us with valuable lessons but also hints of the foreseeable future. Looking closely, we get to pick pieces of the puzzle that we can use to build a vivid picture of what’s to come. Read More

Systems Computing Challenges in the Internet of Things (IoT)

Acrobat Systems Computing Challenges in the Internet of Things
Author: Rajeev Alur, Emery Berger, Ann W. Drobnis, Limor Fix, Kevin Fu, Gregory D. Hager, Daniel Lopresti, Klara Nahrstedt, Elizabeth Mynatt, Shwetak Patel, Jennifer Rexford, John A. Stankovic and Benjamin Zorn
Source: http://cra.org/
Introduction: A recent McKinsey report estimates the economic impact of the Internet of Things (IoT) to be between $3.9 to $11 trillion dollars by 2025. IoT has the potential to have a profound impact on our daily lives, including technologies for the home, for health, for transportation, and for managing our natural resources. Read More

The Italian Connection: An analysis of exploit supply chains and digital quartermasters

Acrobat The Italian Connection: An analysis of exploit supply chains and digital quartermasters
Author: Ned Moran and Ben Koehl
Source: http://blog.shadowserver.org
Overview: On July 5, 2015 an unknown hacker publicly announced on Twitter that he had breached the internal network of Hacking Team – an Italian pentesting company known to purchase 0-day exploits and produce their own trojans. Read More

Securing your data with VeraCrypt

VeraCryptOne of the best ways of keeping people out of your private accounts or preventing unauthorised local access to your personal information is by not letting them on your Desktop or Laptop in the first place, but how do you go about it? Well, it’s straightforward, you create a password! Is that it?, well ‘sort of’, is the response I usually get. Of particular interest is one of the most common misconceptions “I like to call it – False Sense of Security!”, that is, colleagues who usually boast their user profiles are impenetrable because they have ten+ (10+) character long passwords, but then again, what happens if passwords fail you? Ask me and I will tell you it’s simple! Securing your data

Read moreSecuring your data with VeraCrypt