/4月 23, 2018
Privacy today isn’t just about staying away from prying eyes. The very act of communicating across the Internet with open, non-confidential protocols invites exposure to multiple threat types.
/2月 08, 2018
Real estate scams are big business for attackers. Be on the lookout for this one, which can leave home buyers destitute if not caught in time.
/1月 04, 2018
With Mirai rearing its ugly head again, we’re revealing its C&C hostnames so organizations can update their blacklists and protect themselves.
/12月 27, 2017
Bleichenbacher attacks will likely continue to pop up until TLS 1.3 is fully adopted, which could take years.
/10月 26, 2017
While Reaper might be considered an “object lesson” today, it should serve as a blistering warning that IoT security needs to be fixed now.
/10月 03, 2017
Legislation is a good first step toward persuading IoT manufacturers (who want to stay in business) to do the right thing when it comes to the security of their devices.
/9月 13, 2017
There’s a lot of hype surrounding cryptocurrencies, but what’s good for currency traders may not be great for security-minded professionals.
/8月 01, 2017
Quantum computing is coming. What should your strategy be today to deal with what’s on the horizon?
/7月 13, 2017
Safeguarding TLS against attack in the quantum computing age will require changes to today’s TLS key exchange algorithms.
/5月 16, 2017
Is the Intel AMT vulnerability as bad as we all first thought? Either way, here are some suggestions for protecting yourself.
/5月 02, 2017
New information sheds light on Sabu’s activities following the revelation of his identity.
/4月 18, 2017
Notorious hacker of Anonymous and LulzSec fame is challenged by rival hacker, The Jester, to reveal his identity.
/1月 19, 2017
In just four short years, encryption estimates have gone from almost non-existent (in the low single digits before 2013) to just over 50% by the end of 2016. How much of a victory is this?
/10月 23, 2016
According to DARPA, it takes an average of 312 days for security pros to discover software vulnerabilities such as viruses, malware, and other attacks. In hacker time, that’s a virtual eternity in which bad actors can wreak havoc.
/8月 02, 2016
Malicious actors and eavesdroppers are forcing Internet communication into a single cryptographic protocol: SSL.
Get the latest application threat intelligence from F5 Labs.
Follow us on social media.