- Security
- By Catalin Cimpanu
- September 3rd, 2016
USBee Malware Turns Regular USB Connectors into Data-Stealing Weapons
USBee attack inspired by NSA's COTTONMOUTH cyber-weapon
- Security
- By Catalin Cimpanu
- August 23rd, 2016
Intruders Use Virtual Machines on Infected PCs to Hide Their Actions
SecureWorks observes new technique used by threat actors
- Security
- By Catalin Cimpanu
- June 24th, 2016
Malware Can Use Fan Noise to Exfiltrate Data from Air-Gapped Systems
Attack works up to a distance of four meters
- Security Blog
- By Catalin Cimpanu
- September 17th, 2015
Infographic: The Anatomy of a Data Breach
On average, data breaches cost companies $3.79 million
- Security
- By Ionut Ilascu
- January 19th, 2015
Siri’s Voice Could Carry Sensitive Info to an Attacker
Researchers draw attention to steganography-based attacks
- Security
- By Ionut Ilascu
- July 22nd, 2014
Apple iOS Laced with Undocumented Data Exfiltration Services
Surveillance components available on about 600 million iOS devices