Most Recent Articles
New Wi-Fi Restriction policies for improved network security with IBM® MaaS360® Android app version 8.90
From Android version 8.90 and later, IBM® MaaS360® introduces new Wi-Fi restriction policies to provide IT administrators with enhanced control over Wi-Fi settings on Android 13+ devices. These new policies use Google’s latest Android 13 APIs by offeri…
World IoT Day: Connecting the Dots for A Smarter Future
Every year on April 9, we celebrate World Internet of Things (IoT) Day, an occasion to recognize its transformative impact on our lives.
But what exactly is the Internet of Things, and why is it so vital to our daily lives?
What is IoT?
The term “I…
Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers
Note: All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.
In 2024 and continuing into 2025, social media platforms were prime targets for cyber…
Search Engine Scams: How Fraudsters Use Paid Results to Trick You
Are you looking to pay a bill, renew your license, or get in touch with customer support? For many consumers, their first thought is to Google it.
Search engines are incredibly convenient, helping us to quickly find contact info for companies and agen…
100 Days of YARA: Writing Signatures for .NET Malware
If YARA signatures for .NET assemblies only rely on strings, they are very limited. We explore more detection opportunities, including IL code, method signature definitions and specific custom attributes. Knowledge about the underlying .NET metadata st…
The Hidden Dangers of Free Apps and Games for Kids
Nothing in life is truly free—and that includes the apps and games your child loves. While they may not require an upfront payment, many of these “free” apps come with hidden costs. Some collect personal data, others bombard kids with ads, and many enc…
Russian bots hard at work spreading political unrest on Romania’s internet
Internet users in Romania are finding their social media posts and online news articles bombarded with comments promoting blatant propaganda, inciting hatred towards the EU and NATO, and support for Vladimir Putin’s Russia.
That’s the finding of an in…
Hackers Are Using Macros and Telegram to Steal Data from Government Organizations in Ukraine
CERT-UA, the Ukrainian cybersecurity watchdog, has issued a warning about a highly sophisticated espionage campaign aimed at military innovation centers, law enforcement bodies, and local government offices across Ukraine.
The suspected threat actor, …