Security News
The rise of remote work and learning opened new opportunities for many people - as we've seen by the number of people who have moved to new places or adapted to "Workcations." Cybercriminals are taking advantage of the same opportunities - just in a different way. Evaluating the prevalence of malware variants by region reveals a sustained interest by cyber adversaries in maximizing the remote work and learning attack vector.
AnyDesk vs TeamViewer: Remote desktop software comparison We may be compensated by vendors who appear on this page through methods such as affiliate links or sponsored partnerships. AnyDesk and TeamViewer are two popular remote desktop software that can enable IT support teams to connect to any remote desktop or device to perform a wide range of critical functions.
Network-attached storage appliance maker QNAP on Wednesday said it's working on updating its QTS and QuTS operating systems after Netatalk last month released patches to contain seven security flaws in its software. Netatalk is an open-source implementation of the Apple Filing Protocol, allowing Unix-like operating systems to serve as file servers for Apple macOS computers.
For IT security leaders, it's essential to know the answers to such questions as, what is the current threat landscape as it relates to remote workers? What does the future hold? And what changes in. Security strategy are most important as remote work continues?
Remote desktop software is becoming increasingly important as organizations move to remote and hybrid work environments. Dualmon is a remote desktop tool used to control computers from any device to provide remote access and support.
Three security vulnerabilities have been disclosed in the audio decoders of Qualcomm and MediaTek chips that, if left unresolved, could allow an adversary to remotely gain access to media and audio conversations from affected mobile devices. According to Israeli cybersecurity company Check Point, the issues could be used as a launchpad to carry out remote code execution attacks simply by sending a specially crafted audio file.
In this video for Help Net Security, Chris Harris, EMEA Technical Director at Thales, talks about the cyber risks organizations face due to a growing use of the cloud and regular work from home. We're all used to the new way of doing business: working from home or in a hybrid manner, conducting meetings and engagements online.
Remote Access Trojan adds ransomware and DDoS attacks to usual bag of tricks. The Remote Access Trojan, or RAT for short, is a powerful tool among cybercriminals as it allows them to fully access and control a compromised computer or device to steal data or launch additional attacks.
A group of academics from the University of Oxford and Armasuisse S+T has disclosed details of a new attack technique against the popular Combined Charging System that could potentially disrupt the ability to charge electric vehicles at scale. Dubbed "Brokenwire," the method interferes with the control communications that transpire between the vehicle and charger to wirelessly abort the charging sessions from a distance of as far as 47m. "While it may only be an inconvenience for individuals, interrupting the charging process of critical vehicles, such as electric ambulances, can have life-threatening consequences," the researchers explained.
A new remote access trojan named Borat has appeared on darknet markets, offering easy-to-use features to conduct DDoS attacks, UAC bypass, and ransomware deployment. As a RAT, Borat enables remote threat actors to take complete control of their victim's mouse and keyboard, access files, network points, and hide any signs of their presence.