DDoS Weapon Found Hidden in Orbit Downloader

Anti-virus companies don’t just block malware – they also give their customers the option to block ‘potentially unwanted apps’ or PUAs. These aren’t strictly malware, but can violate a user’s privacy. Adware can potentially be a PUA.

Read More >>

Latest Spy Law May Force Mega to Leave New Zealand

Kim Dotcom warned earlier this month that if a new bill – the Telecommunications (Interception Capability and Security) bill known as TICS – were to become law, he would move Mega’s privacy services out of New Zealand. TICS was passed yesterday in the …

Read More >>

The Counter-productive Effect of the Cost of Cybercrime

The cost of cybercrime is frequently used to justify the cost of security products and the implementation of new – and invariably more stringent – cyber laws. But what if those figures are wrong? Could it mean that industry, and government, gets its en…

Read More >>

Poison Ivy Dissected: Commodity Tool or APT Weapon?

The contradiction behind a remote access trojan (RAT) such as Poison Ivy is that while it is easy to use and widely used, it can also indicate a sophisticated – or APT-style – attack designed to exfiltrate specific data from major organizations.

Read More >>

The Detention of David Miranda Raises Serious Issues

Over the weekend David Miranda, partner of Glen Greenwald – the Guardian journalist who published the first of a series of reports detailing United States and British mass surveillance programs, based on documents obtained by Edward Snowden – was deta…

Read More >>