Mindblown: a blog about philosophy.

  • Standalone product test: Kaspersky Security for Microsoft Office 365

    The Office 365 productivity software has become one of Microsoft ‘s flagship products, providing organizations around the world with collaboration tools, office applications and an email service. There are some security solutions on the market that are designed to increase the default protection provided by Office 365 . One such product is the newly launched…

  • GravityRAT malware takes your system’s temperature

    Cisco Talos researchers Warren Mercer and Paul Rascagnères recently discovered and analysed ‘GravityRAT’, an advanced Remote Access Trojan (RAT) that appears to have been used in targeted attacks against organizations in India. Analysis of this piece of malware gives an interesting insight into the current state of malware development. The malware is delivered through a…

  • GravityRAT malware takes your system’s temperature

    Cisco Talos researchers Warren Mercer and Paul Rascagnères recently discovered and analysed ‘GravityRAT’, an advanced Remote Access Trojan (RAT) that appears to have been used in targeted attacks against organizations in India. Analysis of this piece of malware gives an interesting insight into the current state of malware development. The malware is delivered through a…

  • $150k in cryptocurrency stolen through combined BGP-DNS hijack

    If the Internet is, as is often said, held together with elastic bands and pieces of Sellotape, BGP is essentially a bunch of post-it notes that serve as traffic signs. BGP hijacks – in which a malicious attacker essentially takes over one or more ranges of IP addresses – are not extremely common, but for a protocol…

  • $150k in cryptocurrency stolen through combined BGP-DNS hijack

    If the Internet is, as is often said, held together with elastic bands and pieces of Sellotape, BGP is essentially a bunch of post-it notes that serve as traffic signs. BGP hijacks – in which a malicious attacker essentially takes over one or more ranges of IP addresses – are not extremely common, but for a protocol…

  • Security-focused routers may help to mitigate IoT threats

    Walking around the RSA show floor last week, it was clear that the Internet of Things, or IoT, is a hot topic in security. Indeed, the number of connected devices continues to grow and new IoT botnets continue to be discovered, with Saikin and Hajime being two of the most recent examples. It is important…

  • Security-focused routers may help to mitigate IoT threats

    Walking around the RSA show floor last week, it was clear that the Internet of Things, or IoT, is a hot topic in security. Indeed, the number of connected devices continues to grow and new IoT botnets continue to be discovered, with Saikin and Hajime being two of the most recent examples. It is important…

  • The road to IPv6 is generally smooth but contains a few potholes

    “The report of my death was an exaggeration,” Mark Twain famously said in 1897. It was indeed: Twain went on to live for another 13 years but did eventually die. The same is true for IPv4: reports of the pending ‘ipv4pocalypse’ have been doing the rounds for at least a decade (the most recent one…

  • The road to IPv6 is generally smooth but contains a few potholes

    “The report of my death was an exaggeration,” Mark Twain famously said in 1897. It was indeed: Twain went on to live for another 13 years but did eventually die. The same is true for IPv4: reports of the pending ‘ipv4pocalypse’ have been doing the rounds for at least a decade (the most recent one…

  • New paper: Powering the distribution of Tesla stealer with PowerShell and VBA macros

    Ever since their return more than four years ago, initially in targeted attacks and later in large-scale malware campaigns, Office macros have been one of the most prominent ways to spread malware. Today, we publish a research paper by Aditya K. Sood and Rohit Bansal of SecNiche Security , in which they analyse a malware…

Got any book recommendations?