Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP network pattern generated contains a few interesting parameters, names like “&av” (for antivirus?) and “&vm=”(VMware?), The response received looked to be encrypted, which drew my attention. Also, all the network traffic contained the same host Read more…
If thieves gain control of sensitive personally identifiable information (PII) on your computer, your identity can be stolen. Information such as your social security number, driver’s license number, date of birth, or full name are examples of files that should be encrypted. Confidential business data like individual customer information or intellectual property should also be […]
As more and more consumers and organizations alike rely on smartphones for everyday activities, having a functioning and secure mobile site is going to be even more important for retailers today. However, the bounce rates and low conversions for mobile sites still stand in the way of mCommerce becoming a viable channel for most online Read more…
“Those who would give up essential liberty to purchase a little temporary safety, deserve neither liberty nor safety.” – Benjamin Franklin Personal privacy: It’s a tenant of American citizenship, but also the source of a long-held debate over the balance between an individual liberty and national security. Where should governments draw the line, and what Read more…
“Those who would give up essential liberty to purchase a little temporary safety, deserve neither liberty nor safety.” – Benjamin Franklin Personal privacy: It’s a tenant of American citizenship, but also the source of a long-held debate over the balance between an individual liberty and national security. Where should governments draw the line, and what Read more…