Security Blog

Leave blank for all. Otherwise, the first selected term will be the default instead of "Any".
Chris Larsen's picture
Written by
Chris Larsen

About once a year, we see a security report highlighting celebrities that are "dangerous" to search for.

Waylon Grange's picture
Written by
Waylon Grange

Researchers at Symantec recently posted an article about a botnet called ifwatch, which has infected thousands of IoT devices.  In their article they claim the authors acted as a sort of vigilante, since the botnet patches the vuln

Chris Larsen's picture
Written by
Grettir

[Grettir -- one of our analysts who likes to keep a low profile -- posted this in one of our research group forums last night, and everyone agreed it was one of the most awesome blog posts ever, so here it is. -- C.L.]

 

I'm sure it seemed like a good idea at the time. I can just imagine the conversation…

 

Chris Larsen's picture
Written by
Chris Larsen

We had quite a lot of interest, quite a few questions, and several common misconceptions about our report on Shady TLDs (Top Level Domains) a few weeks ago.

Chris Larsen's picture
Written by
Chris Larsen

As regular readers of our blog know, we've been doing a series of posts on shady TLDs this year. Nine so far, in fact. [See links at the bottom of this post.] Yesterday we released a report summarizing some of this research. It was designed for Mr. or Ms.

Chris Larsen's picture
Written by
Chris Larsen

In the previous post, I mentioned that several Chinese porn networks were using .faith sites, and that one was particularly interesting. This is the follow-up that explains what it's doing.