URL FILTERING & OUR SPYWARE SIGNATURE TO THE RESCUE
With the sheer amount of malware in the wild, it is hard to know what is real malware and what is not. Read about Coinhive.com and see if it is considered malware. See what steps you can take to minimize the impact of dubious URLs and subdomains.
The popularity of CryptoCurrency is on the rise. Mining is more difficult, requiring data centers of dedicated servers to turn a profit. A new mining technique uses the combined computing power of thousands of endpoints that mine through a script run in the browser. There's great potential for abuse. Protect yourself.
Pull back the curtain, turn on the light, put on your x-ray vision goggles and inspect the traffic passing through your cleartext tunnels (GRE, non-encrypted IPSec, or GTP-U tunnels). Don’t let your tunneled traffic go unchecked! You want tunnel vision!
Reaper's challenge still stands, and that nice, cozy-warm hoodie is yet unclaimed! It could be yours -- easily, too! Show off those hacking skills, or just send us a funny pic or a spoof of your liking and ours. Easy peasy, and it earns you a special badge, fame, recognition and who knows what more? But, remember, you must play to win!