Blog

Exploit kit

Anatomy of Flash Exploit (CVE-2015-8651) integrated into Rig Exploit Kit

  • 6
    Shares
 April 25, 2017
cybersecurity

Estimated reading time: 4 minutes

We all know how the infamous RIG Exploit Kit have been used to infect the end users. We are seeing a constant spike in the usage of the RIG Exploit Kit by malware actors to spread malware. Its use has been noticed in different campaigns such as EITest, pseudoDarkleech, and...

Future Watch VII: Your Smart TV opens up a new frontier for hacks and spying

 December 17, 2012

Estimated reading time: 3 minutes

Just like smartphones arrived in most markets and obliterated regular feature phones, smart TV’s are expected to change the way we interact with our television sets. A smart TV, or hybrid TV, comes integrated with several web 2.0 applications and widgets that allow users to access the Internet and obtain...

Security news updates from the last week

 December 1, 2012

Estimated reading time: 2 minutes

This week was a rather busy one in the security industry. Here are some of the notable highlights that you should not miss out on. Authorized email monitoring increases by 36% in September 2012 According to reports, email monitoring by national security agencies has jumped by 36% in September 2012....