2018 Predictions: Will Technology Deliver on its Promise in 2018?

The past twelve months has been a turbulent year for many, not least with its fair share of extreme weather and economic crises. However it’s not all been doom and gloom. Google’s 2017 Year in Search revealed the most popular type of question asked to its search engine was “how” – evidencing people’s yearning to…

Are you caught in the Bitcoin “gold rush” but is someone else reaping the rewards?

Seems like everyone has been talking about Bitcoin lately. If you remember the dot com boom of the late nineties like I do, you might have a slight feeling of deja vu. But whether we are facing a bubble or not, one thing learned recently while doing some network data analysis, is that a new…

Big Online Bargains Mean Big Online Threats. Who’s Most at Risk during Black Friday?

If you’re an online bargain hunter like me, this upcoming weekend provides an abundance of deals you won’t want to miss out. In fact, this year’s Cyber Monday will be the biggest online shopping day in history, according to Adobe — generating $6.6 billion in expected sales. Between Black Friday, Sofa Sunday, and Cyber Monday,…

Security, Security, Security: The Top Three IoT Challenges Confronting CSPs

While this may sound like the old joke about the three “L’s” of real estate success — location, location, location — it’s actually deadly serious. When it comes to IoT (Internet of Things), CSPs should pay particular attention to the 3 S’s: Security, Security, Security. Unless internalized, there could be some real heartache coming to…

IoT Security: Threat to an Opportunity

The promise of connected things has finally started to make itself felt. Carriers are busy launching their IoT offerings preparing for the massive burst of growth as the adoption of connected devices begins to outstrip that of mobile handsets.  From fleet tracking telemetry to home alert systems, the use cases have been endless and many…

Declawing the CopyCat Malware: Why and How?

Just as the Petya ransomware scheme was discovered and we managed to tackle it, we now face a new challenge to mobile security: CopyCat malware. How does it work? CopyCat generates and steals ad revenues. It’s disguised as popular apps and it infects each device once downloaded by collecting data about the infected device and…

Allot CloudTrends Report Q2/2015: Malware can get into your network through backdoors!

With the growth of enterprise mobility and cloud migration, enterprises and SMBs are facing complex security issues. Despite being quite effective in warding off known threats, it’s the tide of unknown and backdoor threats that put organizations under pressure. We at Allot have just published a thought-provoking report, based on real data of malicious traffic…