Hungry Hippos Meet Interactive Cyber Management at Black Hat USA 2016

A unique, interactive game at this year’s Black Hat USA event will test players’ ability to stay calm in a crisis, a key skill to have during a cyberattack

The post Hungry Hippos Meet Interactive Cyber Management at Black Hat USA 2016 appeared first on Security Intelligence.

Continue reading Hungry Hippos Meet Interactive Cyber Management at Black Hat USA 2016

Exploring Operating Systems for the Internet of Things

As the Internet of Things becomes more prevalent, the demand for the technologies needed to manage and secure devices becomes greater.

The post Exploring Operating Systems for the Internet of Things appeared first on Security Intelligence.

Continue reading Exploring Operating Systems for the Internet of Things

The Brazilian Malware Landscape: A Dime a Dozen and Going Strong

Although Brazilian malware tends to be unsophisticated, cybercrime continues to thrive due to the general population’s lack of security awareness.

The post The Brazilian Malware Landscape: A Dime a Dozen and Going Strong appeared first on Security Intelligence.

Continue reading The Brazilian Malware Landscape: A Dime a Dozen and Going Strong

Going for Gold: Cybercrime and the Brazilian Threat Landscape

The upcoming Summer Olympics in Rio de Janeiro provide an opportunity for cybercriminals to exploit the Brazilian threat landscape.

The post Going for Gold: Cybercrime and the Brazilian Threat Landscape appeared first on Security Intelligence.

Continue reading Going for Gold: Cybercrime and the Brazilian Threat Landscape

Hacking the Connected Building: Real-Life ‘Mr. Robot’

The second season of “Mr. Robot” could focus on IoT and hacking a connected building, just like the IBM X-Force team was able to do in real life.

The post Hacking the Connected Building: Real-Life ‘Mr. Robot’ appeared first on Security Intelligence.

Continue reading Hacking the Connected Building: Real-Life ‘Mr. Robot’

Two Heads Are Better Than One: Going Under the Hood to Analyze GozNym

IBM X-Force researchers recognized that the GozNym banking malware leverages features from two types of malware to make it double the threat.

The post Two Heads Are Better Than One: Going Under the Hood to Analyze GozNym appeared first on Security Intelligence.

Continue reading Two Heads Are Better Than One: Going Under the Hood to Analyze GozNym

GootKit: Bobbing and Weaving to Avoid Prying Eyes

IBM X-Force researchers recently studied the GootKit banking Trojan — and the many ways it effectively evades detection and maintains persistence.

The post GootKit: Bobbing and Weaving to Avoid Prying Eyes appeared first on Security Intelligence.

Continue reading GootKit: Bobbing and Weaving to Avoid Prying Eyes

The Webshell Game Continues

IBM X-Force researchers have noted a dramatic increase in the use of malicious webshell attacks throughout the first half of 2016.

The post The Webshell Game Continues appeared first on Security Intelligence.

Continue reading The Webshell Game Continues

Remote Code Execution in Xiaomi MIUI Analytics

The IBM X-Force AppSec Research Team has discovered a remote code execution (RCE) vulnerability in MIUI, the flavor of Android developed by Xiaomi.

The post Remote Code Execution in Xiaomi MIUI Analytics appeared first on Security Intelligence.

Continue reading Remote Code Execution in Xiaomi MIUI Analytics

Account Takeovers: They Can Happen to Anyone

Social media account takeovers have recently impacted some high-profile individuals and groups, but a few simple measures can greatly reduce this risk.

The post Account Takeovers: They Can Happen to Anyone appeared first on Security Intelligence.

Continue reading Account Takeovers: They Can Happen to Anyone