The 25th anniversary of the webcam: What did it bring us?

Credit to Author: Pieter Arntz| Date: Fri, 30 Nov 2018 16:00:43 +0000

This month the webcam has been around for 25 years. Ho has it developed and which are the concerns surrounding webcams and CCTVs?

Categories:

Tags:

(Read more…)

The post The 25th anniversary of the webcam: What did it bring us? appeared first on Malwarebytes Labs.

Read more

Explained: regular expression (regex)

Credit to Author: Pieter Arntz| Date: Fri, 31 Aug 2018 15:00:53 +0000

What is regular expression (regex) and what makes it vulnerable to attack? Learn how to use regex safely and avoid ReDoS attacks in the process.

Categories:

Tags:

(Read more…)

The post Explained: regular expression (regex) appeared first on Malwarebytes Labs.

Read more

Back to Basics: Why We Need to Encourage More Secure IoT Development

Credit to Author: Mike Gibson| Date: Wed, 22 Aug 2018 12:05:33 +0000

The Internet of Things (IoT) is radically reshaping the way we live and work. Before our very eyes, organizations are becoming more agile, efficient and cost effective to run, all while consumers marvel at the wonders of the smart home, fitness trackers and connected cars. There’s just one major problem: Much of this new infrastructure…

The post Back to Basics: Why We Need to Encourage More Secure IoT Development appeared first on .

Read more

Trojans: What’s the real deal?

Credit to Author: Christopher Boyd| Date: Wed, 25 Jul 2018 15:40:47 +0000

We take a fresh look at Trojans: the history of the term, the most popular threats over the years, the different types of Trojans, and their relationship with social engineering.

Categories:

Tags:

(Read more…)

The post Trojans: What’s the real deal? appeared first on Malwarebytes Labs.

Read more

Study: Attack on KrebsOnSecurity Cost IoT Device Owners $323K

Credit to Author: BrianKrebs| Date: Mon, 07 May 2018 16:47:20 +0000

A monster distributed denial-of-service attack (DDoS) against KrebsOnSecurity.com in 2016 knocked this site offline for nearly four days. The attack was executed through a network of hacked “Internet of Things” (IoT) devices such as Internet routers, security cameras and digital video recorders. A new study that tries to measure the direct cost of that one attack for IoT device users whose machines were swept up in the assault found that it may have cost device owners a total of $323,973.75 in excess power and added bandwidth consumption. My bad.

Read more