Articles for September 2016

Raum turns the most popular torrents on the web into malware spreading weapons | ZDNet


Security researchers from InfoArmor have revealed the use of Raum in active campaigns to spread malware through torrents.

On Tuesday, InfoArmor released a detailed analysis of Raum, most often found packaged with the most popular torrent files on the Internet.

While torrent packages themselves are not illegal — as the technology behind them, BitTorrent, is simply a protocol used to increase the download speed of large files between systems — the most popular and active torrents are usually uploaded to share copyrighted material.

Found through websites including The Pirate Bay, ExtraTorrent and TorrentHound, these torrents allow users to share movies, television shows, games and music, among other content.

When torrents and P2P networking first began to emerge online, you could often tell if torrents were fake or malicious files based on file sizes and peer reviews. However, with the evolution of both torrents and cyberthreats, ways to distribute malware have become more sophisticated.

Source: Raum turns the most popular torrents on the web into malware spreading weapons | ZDNet

Loading

How to Hack Smart Bluetooth Locks and IoT Devices — Check this Out


Bluetooth Low Energy, also known as Bluetooth Smart or Bluetooth 4, is the leading protocol designed for connecting IoT devices, medical equipment, smart homes and like most emerging technologies, security is often an afterthought.

As devices become more and more embedded in our daily lives, vulnerabilities have real impact on our digital and physical security.

Source: How to Hack Smart Bluetooth Locks and IoT Devices — Check this Out

Loading