[email protected] +603-2181 3666
Extol Threat Intelligent Notification

Not long ago I heard from a reader who wanted advice on how to stop someone from scanning his home network, or at least recommendations about to whom he should report the person doing the scanning. I couldn’t believe that people actually still cared about scanning, and I told him as much: These days there are […]

IT News

This week, nationwide beauty products chain Sally Beauty disclosed that, for the second time in a year, it was investigating reports that hackers had broken into its networks and stolen customer credit card data. That investigation is ongoing, but I recently had an opportunity to interview a former Sally Beauty IT technician who provided a […]

IT threat evolution in Q1 2015
May 6, 2015

Q1 in figures According to KSN data, Kaspersky Lab products detected and neutralized a total of 2,205,858,791 malicious attacks on computers and mobile devices in the first quarter of 2015. Kaspersky Lab solutions repelled 469,220,213 attacks launched from online resources located all over the world. Kaspersky Lab’s web antivirus detected 28,483,783 unique malicious objects: scripts, […]

Normally, if one wishes to buy stolen account credentials for paid online services like Netflix, Hulu, XBox Live or Spotify, the buyer needs to visit a cybercrime forum or drop into a dark Web marketplace that only accepts Bitcoin as payment. Increasingly, however, these accounts are showing up for sale at Payivy[dot]com, an open Web marketplace […]

Would you lock your house and leave the keys hanging in the keyhole?  Would you just leave the keys lying around where it could easily be stolen?  No, you wouldn’t.  Yet, there are those who would leave their passwords exposed for anyone to see, share their passwords, or even worse, have weak passwords and use […]

RSA Conference 2015
April 22, 2015

The RSA Conference 2015 is being held at the Moscone Center in San Francisco. It a massive event, with thousands of people in attendance. A huge number of booths built up by vendors provide coffee bars, presentations, and swag giveaways. Threat intelligence is hawked by many here. But, some of the most surprising parts of […]

One of the most important features of a malicious attack is its ability to conceal itself from both protection solutions and victims. The main role in performing a hidden attack is played by exploits to software vulnerabilities that can be used to secretly download malicious code on the victim machine. Generally, exploits are distributed in […]

BREAKING NEWS! You feel safe, knowing that you anti-malware is standing guard and will stop any suspicious intrusion. Well, malware authors have gone one up on security file scanners by utilizing new methods of avoiding detection. These cyber crooks are doing this by using fileless malware.  Fileless malware will hide itself in locations that are […]