/2 08, 2018
Real estate scams are big business for attackers. Be on the lookout for this one, which can leave home buyers destitute if not caught in time.
/1 04, 2018
With Mirai rearing its ugly head again, we’re revealing its C&C hostnames so organizations can update their blacklists and protect themselves.
/12 27, 2017
Bleichenbacher attacks will likely continue to pop up until TLS 1.3 is fully adopted, which could take years.
/10 26, 2017
While Reaper might be considered an “object lesson” today, it should serve as a blistering warning that IoT security needs to be fixed now.
/10 03, 2017
Legislation is a good first step toward persuading IoT manufacturers (who want to stay in business) to do the right thing when it comes to the security of their devices.
/9 13, 2017
There’s a lot of hype surrounding cryptocurrencies, but what’s good for currency traders may not be great for security-minded professionals.
/8 01, 2017
Quantum computing is coming. What should your strategy be today to deal with what’s on the horizon?
/7 13, 2017
Safeguarding TLS against attack in the quantum computing age will require changes to today’s TLS key exchange algorithms.
/5 16, 2017
Is the Intel AMT vulnerability as bad as we all first thought? Either way, here are some suggestions for protecting yourself.
/5 02, 2017
New information sheds light on Sabu’s activities following the revelation of his identity.
/4 18, 2017
Notorious hacker of Anonymous and LulzSec fame is challenged by rival hacker, The Jester, to reveal his identity.
/1 19, 2017
In just four short years, encryption estimates have gone from almost non-existent (in the low single digits before 2013) to just over 50% by the end of 2016. How much of a victory is this?
/10 23, 2016
According to DARPA, it takes an average of 312 days for security pros to discover software vulnerabilities such as viruses, malware, and other attacks. In hacker time, that’s a virtual eternity in which bad actors can wreak havoc.
/8 02, 2016
Malicious actors and eavesdroppers are forcing Internet communication into a single cryptographic protocol: SSL.
Get the latest application threat intelligence from F5 Labs.
Follow us on social media.