Man-on-the-side – peculiar attack
What is a man-on-the-side attack, and how does it differ from a man-in-the-middle attack?
11 articles
What is a man-on-the-side attack, and how does it differ from a man-in-the-middle attack?
Researchers find a new reliable way to track the location of wireless Wi-Fi devices.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
Cybercriminals are using steganography to hide their code and seek industrial data.
A lightbulb is all the specialist equipment Lamphone needed to eavesdrop on a conversation in a soundproofed room.
Kaspersky Internet Security prevents eavesdropping through a computer microphone. Here’s how it works.
An Indian-speaking threat actor, Dropping Elephant chooses targets mainly in the Asian region, paying particular attention to Chinese government/diplomatic organizations – and also to foreign embassies and diplomatic offices in China.
Kaspersky Lab has discovered an advanced attack on its own internal network and is sharing its investigation results. TL;DR – Customers are safe; neither products nor services have been compromised.
A malware that cannot be wiped from the victim’s hard drive does exist. However, it’s so rare and expensive, that you probably won’t ever encounter it.
Microsoft moves against a malware-supporting webhosting company, NoIP, causing collateral damage in the process. The Miniduke APT campaign returns.