Archive for the
‘Uncategorized’ Category

VPNFilter is malware that is targeting select Linksys, MikroTik, TP-Link, and Netgear home or small office routers.  There is also evidence that the QNAP network attached storage (NAS) device is vulnerable. The FBI released guidance to reboot or power cycle (unplug then plug back in) your router as a way to mitigate the malware.  This […]

Protocol 46 is proud to announce that Founder and CTO Eric Ebner has agreed to participate on the advisory board for MN Cyber! MN Cyber is a partnership between Metropolitan State University, the Minnesota State IT Center of Excellence, and other public/private partnerships.  The mission of MN Cyber is to position Minnesota as a national leader […]

The Perfect Coin for Cryptomining Cryptomining is a key part of the cryptocurrency craze.  As the idea develops, so too has new ways to exploit it.  The ease of introducing new coins has provided a way for criminals to introduce new coins that better meet more nefarious needs.  Enter Monero.  Bitcoin proved to be to […]

Coinhive is Back This isn’t the first time Coinhive has made our news, and it probably won’t be the last.  We’ve previously written about Coinhive being hacked and the hackers stealing the mined Monero cryptocurrency to their own accounts. See the previous article here: Cryptocurrency Monero Mined With Your CPU What’s Happening Now? The rise […]

Rise of AI As the technology rapidly develops, personal assistants (PA) or AI as some call it are creeping into our everyday life.  Devices of all kinds are adopting PA into their programming including phones, cars, TVs, computers, and standalone devices.  Because of this most people now have Alexa, Google, Siri or Cortana on some […]

Dark Caracal A mistaken server data leak has by accident revealed a large scale government sponsored hacking attack.  Dubbed Dark Caracal it’s unique in that it is likely government sponsored hacking that is targeting mobile devices.  After some files were leaked to the internet, researchers were able to trace group back to the Lebanon.  The […]

A New Way to Steal Cryptocurrency Coinhive, a service that uses traffic visiting a website to mine the cryptocurrency Monero was recently hacked.  Hackers were able to upload a corrupted code. The code made client websites mine for the hacker instead of the host website.  The disruption lasted for 6 hours.  Activity during this time […]

The Internet of Things Internet of Things (IoT), the term given to all our gadgets that are connect to the internet.  Webcams, to smartwatches, to medical devices and home appliances, all are IoT devices.  While IoT devices makes our day to day lives easier, it may be vulnerability.  IoT devices are often overlooked when it […]

A New Way for Phishing Over the past year Phishing sites have been increasingly using HTTPS.  As HTTPS begins more popular in general this is not entirely a surprise; but, the increase is more than expected.  Further, HTTPS is not necessary for a phishing site to function.  Towards the end of 2017 a quarter of […]

The Dark Web A dark web monitoring firm called 4iQ has discovered a mass of data on the dark web.  In simple terms the dark web is areas of the internet that are not indexed by search engines and so need special ways to reach the site.  It is also much harder to track people […]

0
10
image
https://protocol46.com/wp-content/themes/blake/
https://protocol46.com//
#0070bc
style2
scroll
Loading posts...
/home/p46webadmin/public_html/
#
on
none
loading
#
Sort Gallery
https://protocol46.com/wp-content/themes/blake
on
yes
yes
off
Enter your email here
on
off