/abr. 23, 2018
Privacy today isn’t just about staying away from prying eyes. The very act of communicating across the Internet with open, non-confidential protocols invites exposure to multiple threat types.
/feb. 08, 2018
Real estate scams are big business for attackers. Be on the lookout for this one, which can leave home buyers destitute if not caught in time.
/ene. 04, 2018
With Mirai rearing its ugly head again, we’re revealing its C&C hostnames so organizations can update their blacklists and protect themselves.
/dic. 27, 2017
Bleichenbacher attacks will likely continue to pop up until TLS 1.3 is fully adopted, which could take years.
/oct. 26, 2017
While Reaper might be considered an “object lesson” today, it should serve as a blistering warning that IoT security needs to be fixed now.
/oct. 03, 2017
Legislation is a good first step toward persuading IoT manufacturers (who want to stay in business) to do the right thing when it comes to the security of their devices.
/sep. 13, 2017
There’s a lot of hype surrounding cryptocurrencies, but what’s good for currency traders may not be great for security-minded professionals.
/ago. 01, 2017
Quantum computing is coming. What should your strategy be today to deal with what’s on the horizon?
/jul. 13, 2017
Safeguarding TLS against attack in the quantum computing age will require changes to today’s TLS key exchange algorithms.
/may. 16, 2017
Is the Intel AMT vulnerability as bad as we all first thought? Either way, here are some suggestions for protecting yourself.
/may. 02, 2017
New information sheds light on Sabu’s activities following the revelation of his identity.
/abr. 18, 2017
Notorious hacker of Anonymous and LulzSec fame is challenged by rival hacker, The Jester, to reveal his identity.
/ene. 19, 2017
In just four short years, encryption estimates have gone from almost non-existent (in the low single digits before 2013) to just over 50% by the end of 2016. How much of a victory is this?
/oct. 23, 2016
According to DARPA, it takes an average of 312 days for security pros to discover software vulnerabilities such as viruses, malware, and other attacks. In hacker time, that’s a virtual eternity in which bad actors can wreak havoc.
/ago. 02, 2016
Malicious actors and eavesdroppers are forcing Internet communication into a single cryptographic protocol: SSL.
Get the latest application threat intelligence from F5 Labs.
Follow us on social media.