Cyber for all - Page 14
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective
Yes, hacking cars is going to be one of the problems of this era
Digitalization is ushering in a new era in the automotive industry, but it has also opened a door to hacking cars[...]
Read moreThe stress as adversarial factor for cyber decision-making
Cyber decision-making is often conditioned by very short response times. High-level research analyzes the impact of stress in these situations[...]
Read more4 lessons learned from Babuk’s source code
Black Arrow Tarlogic's threat hunting team analyzes Babuk's source code to unravel how one of the most active ransomware of 2021 operates[...]
Read moreBiden gets serious… What if Washington succeeds in changing the cyberattacks map?
USA is starting to offer million-dollar rewards to catch hostile groups. This aggressive response could shift the cyberattacks map to Europe and Asia[...]
Read moreGolang opens the door to full-blown ransomware
In recent months, a number of malicious codes developed with Golang have appeared, causing concern in the cybersecurity community[...]
Read moreDigital mules, social engineering continues to do its thing
Frauds that take advantage of social engineering techniques have not stopped growing in recent years and have even accelerated with the pandemic[...]
Read moreThe risks of teleworking, is this practice becoming widespread?
Insecure credentials and networks, infected devices, untrained personnel… These are the risks of teleworking, a phenomenon that is here to stay[...]
Read moreIoT and cybersecurity, the next big crisis is knocking on the door
The alliance between IoT and cybersecurity will be indispensable to contain the threats posed by the Web[...]
Read moreFrom Ramp Tramp to Doom, 6 things you need to know about reverse engineering
Defining the basics of reverse engineering is a challenge that is surely as complex as the practice of the discipline itself[...]
Read moreDangers of social networks, the trap at home
Security breaches resulting from the dangers of social networks represent a latent risk for organizations[...]
Read more