Criminals Hacking CPUs to Mine Cryptocurrencies

  Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing resources to mine cryptocurrencies. Cryptocurrency mining requires massive processing power to solve complex algorithms as part of the blockchain validation mechanism. This…

“Anonymous” to Erase Israel from the Internet—Or Is It?

  Five years ago, a “hacktivist” group of cyber-disruptors united to attack the Internet infrastructure and websites of the State of Israel. The initial date of that attack was the 7th of April 2013, the eve of Israel’s annual Holocaust Memorial Day, and they have continued to target Israel every year on the anniversary of…

IoT Security and the Home Consumer

  True story. All I wanted was to upgrade our home thermostat to a smart one. What did I end up with? A lecture about IoT security. Who gave me the lecture? You won’t guess—my wife! Smart and educated, my wife is well-versed in what’s going on in the world through reading newspapers and watching…

Recapping MWC 2018: Four Things We Would Like to Have Seen

Another Mobile World Congress (MWC) has come and gone. An impressive event as always, this year over 100,000 people descended on an unusually chilly Barcelona for the world’s largest exhibition for the ever-expanding mobile industry to learn about the latest trends and technologies – and to showcase the latest innovations. If one word were to…

2018 Predictions: Will Technology Deliver on its Promise in 2018?

The past twelve months has been a turbulent year for many, not least with its fair share of extreme weather and economic crises. However it’s not all been doom and gloom. Google’s 2017 Year in Search revealed the most popular type of question asked to its search engine was “how” – evidencing people’s yearning to…

Security, Security, Security: The Top Three IoT Challenges Confronting CSPs

While this may sound like the old joke about the three “L’s” of real estate success — location, location, location — it’s actually deadly serious. When it comes to IoT (Internet of Things), CSPs should pay particular attention to the 3 S’s: Security, Security, Security. Unless internalized, there could be some real heartache coming to…

IoT Security: Threat to an Opportunity

The promise of connected things has finally started to make itself felt. Carriers are busy launching their IoT offerings preparing for the massive burst of growth as the adoption of connected devices begins to outstrip that of mobile handsets.  From fleet tracking telemetry to home alert systems, the use cases have been endless and many…

Biting the Hand that Feeds You: When IoT-Based Attacks Strike Service Providers

While we’re arming ourselves, our businesses and organizations against IoT-based attacks, few people talk about the damage they do to service providers. It’s something that gets overlooked, but the potential for causing detrimental impact is considerable. Service providers can suffer particularly badly because: They can be a target Attacks can originate from within their own…

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods The first two instalments of this series covered TOS Floods and SYN Floods, while last time, we focused our attention on Ping Floods. This final instalment in the education series looks at DNS Floods, what differentiates them from other kinds of DDoS attacks, and…

The Future of MWC

Although the official name of last week’s premier conference is “Mobile World Congress,” I think this show may change its name in the coming years. Because it’s not just about mobile anymore. Or to be more accurate, mobile is not just a technology, it’s the way we live.