Shedding Skin – Turla’s Fresh Faces

Turla, also known as Venomous Bear, Waterbug, and Uroboros, may be best known for what was at the time an “ultra complex” snake rootkit focused on NATO-related targets, but their malware set and activity is much broader. Our current focus is on more recent and upcoming activity from this APT. Continue reading Shedding Skin – Turla’s Fresh Faces

Who’s trying to eavesdrop on your customers’ encrypted mobile traffic?

The number one source of TLS/SSL Man in the Middle (MitM) attacks on encrypted mobile traffic are not corporate firewalls or captive portals used by hotels, airports and other organizations offering free Wi-Fi access – it’s spyware. “A big chunk … Continue reading Who’s trying to eavesdrop on your customers’ encrypted mobile traffic?

Researchers Break IPsec VPN Connections with 20-Year-Old Protocol Flaw

The attack targets IKE’s handshake implementation used for IPsec-based VPN connections, opening the door for MiTM attacks or for bad actors to access data carried in VPN sessions. Continue reading Researchers Break IPsec VPN Connections with 20-Year-Old Protocol Flaw

A study of car sharing apps

The growing popularity of car sharing services has led some experts to predict an end to private car ownership in big cities. But information security specialists have started raising some pertinent questions: how are the users of these services protected and what potential risks do they face in the event of unauthorized access to their accounts? Continue reading A study of car sharing apps

Update your devices: New Bluetooth flaw lets attackers monitor traffic

By Waqas
The Bluetooth flaw also opens door to a man-in-the-middle attack. The IT security researchers at Israel Institute of Technology have discovered a critical security vulnerability in some implementations of the Bluetooth standard in which not al… Continue reading Update your devices: New Bluetooth flaw lets attackers monitor traffic