Home Tags IP Address

Tag: IP Address

The reasons why you should hide your IP address

As your IP becomes firmly linked to your physical identity, it is more important than ever that we take personal responsibility for how exposed...

Malware finds unwitting ally in GitHub

Just because it's on GitHub doesn't mean it's legitimate.A financially motivated espionage group is abusing a GitHub repository for C&C (command and control) communications,...

DNS lookups can reveal every web page you visit, says German...

The fix is simple: turn your modem on and off again to get a new IP address. Or ask your ISP to assign them...

Microsoft’s DRM can expose Windows-on-Tor users’ IP address

Anonymity-lovers best not watch movies as .WMV files Windows users running the Tor browser can be tricked into uncloaking themselves, with a pretty straightforward...

TrustPort Internet Security Sphere (2017)

I try my best to review the latest security suite and antivirus releases from all the security companies, but occasionally I miss one. The...

Researchers ID Decades-Old 'Fruitfly' Mac Malware

It uses antiquated code, possibly to decrease chances of detection. A rare strain of malware known as "Fruitfly" appears to have been lurking in the...

ProtonMail Gets Own Tor-Accessible .Onion Hidden Service

Users of the encrypted email service ProtonMail looking for an extra layer of security now have the option of accessing their inbox directly through...

Deceive in order to detect

Interactivity is a security system feature that implies interaction with the attacker and their tools as well as an impact on the attack scenario...

Insecure Hadoop installs next in ‘net scum crosshairs

Because MongoDB, Elasticsearch ransomware attacks are sooo last week Rinse-and-repeat ransomware attacks on data services left unsecured by dozy sysadmins are now hitting Hadoop instances. Fidelis...

US court says PSN data doesn’t get Fourth Amendment protection

Aurich x Gettyreader comments 34 Share this story If you have any legally incriminating information sitting in your PSN account, don't count...

Newly discovered Mac malware found in the wild also works well...

reader comments 32 Share this story A newly discovered family of Mac malware has been conducting detailed surveillance on targeted networks, possibly...

Threat Attribution: Misunderstood & Abused

Despite its many pitfalls, threat attribution remains an important part of any incident response plan. Here's why. Threat attribution is the process of identifying actors...