Tag Archives: Threat Research

Ladies and Gentlemen, prepare your CPU—web browser mining is coming

You may have noticed that certain websites put significant load on your CPU and slow it down. Aside from the possibility that you may not have the best hardware, the slowdown could be due to a JavaScript miner embedded in the website. Instead of getting bombarded with annoying ads, you may now be getting an ad-free experience while unknowingly lending your computing resources to help mine cryptocurrency—in this case Monero, a privacy-focused alternative to the ever-popular Bitcoin.

The 5 Vs of big data for machine learning

      No Comments on The 5 Vs of big data for machine learning

Most of today’s malware goes through automated modification, upgrade, and re-deployment so frequently and quickly that machine learning is a vital security solution component. Machine learning allows a system to learn from data and observation automatically. The most effective machine learning occurs when the learnings are gained via big data: the more information we feed our machines, the more accurately they identify trends and create models. This is true not only in security, but in every area that uses machine learning.

How AI outsmarts cybercriminals

      No Comments on How AI outsmarts cybercriminals

Artificial intelligence (AI) is the hottest new trend that’s been around for years. While that may sound like an oxymoron, there’s a reason the buzz around AI and its subset, machine learning, hasn’t quieted down and is likely to continue for a long time. It’s uniquely critical in our fight against the ever-growing number and variety of cyberthreats and vital to our ability to scan for and remove malware.

IoT weaknesses put webcams at risk for attack [infographic]

Out of all the cybercrimes from malware to social engineering, the creepiest has to be a stranger watching your child through a webcam or baby monitor in their room. As this year’s Mobile World Congress starts in Barcelona, Avast researchers reveal that half a million smart devices in the city, including webcams and baby monitors, are currently vulnerable to cyber attack.

Malware posing as Dual Instance app steals users’ Twitter credentials

Do you have more than one Twitter or WhatsApp account? If you answered yes, do you want to log in to these multiple accounts at the same time? Up until this point, logging in to multiple social media accounts at one time has only been possible by usi…