What 2018 holds for us?

Cybersecurity Predictions for 2018

2017 was the year when it became clear that we need to take our online security seriously. Huge companies like Uber or Instagram fell victim to breaches and hacks. Not to mention the most significant breach of the year brought you by Equifax. Many are asking the question: what’s next? Going into the new year, we believe this is an important question …

Cybersecurity for travelers

The Ultimate Guide to Cybersecurity for Travelers

As Christmas approaches, you may be booking a much-needed getaway. You might be flying back home or somewhere more exotic. You prepared intensely, and you are ready to go on an adventure. But how about security? Read our ultimate guide to cybersecurity for travelers and learn more about great habits on the go. Failing to take the correct precautions can …

Connected to Bluetooth? Beware of BlueBorne

BlueBorne as a new attack vector was discovered in September by Armis Labs. It affected Android, iOS, Windows, Linux, and the devices using them, including Amazon Echo and Google Home devices. Armis Labs and other researchers have posted online videos with their experiments and proof-of-concept hacks of Samsung Galaxy S8, Amazon Echo devices. BlueBorne is not something new. And though …

HP printer might be a way for the hacker to get you

HP printer might be a way for the hacker to get you

You only print once (YOPO) is a slang used by millennials, when their Hewlett Packard (HP) printers are hacked. Even though it seems that printing is not a hobby you would take up if you wanted to live dangerously, cybercriminals have another opinion. In a recent discovery, researchers unveiled a potentially dangerous vulnerability in HP printer firmware. This vulnerability leaves …

Uber hack affects 57 million customers and drivers

Uber hack affects 57 million customers and drivers

In 2016, Uber was hacked, but the breach was not disclosed until this Tuesday. Hackers accessed the personal information of millions of Uber users’, including names, email addresses and phone numbers and the license numbers of 600 000 drivers. Uber informed that none of the sensitive information such as credit card numbers, bank account details and social security numbers had …

Grab some popcorns and try to not fall for a Netflix phishing attempt

Netflix and no chill: a new phishing attempt

Netflix users are suffering from yet another batch of phishing emails.  They get emails that look legit and ask them to enter personal information into the website. Attempts to phish Netflix users are pretty common. The emails appear, sometimes get into the headlines. Then they go through a makeover: a redesign to evade spam folder and other defensive filters. And later …

You need to be aareful while surfing the Google Play Store. Some of the apps might be not like the others.

What’s up with the fake Whatsapp apps?

More than one million people have downloaded fake Whatsapp applications. It’s possibly the highest number of downloads so far. Of course, it’s not the first time it happened – counterfeit apps with adware were surfacing more and more recently. Fake Whatsapp: how does it work? Lately, it was not very easy to pass the security checks of Google Play Store. …

Washing machines can be dangerous

HomeHack and spying home appliances

LG SmartThinQ, the mobile app that connects and controls smart home appliances made by LG Electronics, has been vulnerable. HomeHack vulnerability allowed potential attackers to spy on users via Hom-Bot vacuum’s video camera, or to play around with washing machines and dishwashers, turning them on or off. Luckily, Check Point’s research team discovered HomeHack. It notified LG Electronics of this on July 31st. …

Time to prepare for Reaper botnet is now

Reaper botnet: how ISPs and Telcos can protect home users?

75.4 billion connected devices will be online by 2025. The critical problem with smart devices is that they are not secure by design. Most Internet of Things (IoT) gadgets in the automated homes are unprotected against hacking, phishing, unauthorized access, and malware. One of the threats that recently made the headlines is the Reaper botnet. 28 000 to 1 million …