Declawing the CopyCat Malware: Why and How?

Just as the Petya ransomware scheme was discovered and we managed to tackle it, we now face a new challenge to mobile security: CopyCat malware. How does it work? CopyCat generates and steals ad revenues. It’s disguised as popular apps and it infects each device once downloaded by collecting data about the infected device and…

ISPs Must Take the Wheel when Driving The IoT in Their Networks

From connected vehicles and vending machines to smart meters and wearables. The Internet of (connected) things (IoT) is promising to change our daily life as we know it, making it easier, better and more efficient. The recent massive Distributed Denial of Service (DDoS) attack, however, disrupted some of the most popular Internet services like Twitter and AirBnB. Carried out using an army of IoT botnets, the attack raised alarm bells with service providers. It proved that besides the smart and cool experiences IoT devices can deliver, there is a big security risk that cannot be overlooked.

“There is gold in them thar networks”…and I agree!

I agree with Jim Martin, and it’s even more relevant today than it was back then. Beyond providing us with worldwide 24/7 connectivity that we have learned to expect, Communication Service Providers – CSPs – are masters of brand marketing, segmentation and continuous introduction of new pricing packages.  When I browse the websites of CSPs,…