Security Blog

Black-box testing of cellular networks: how operators protect subscribers from hacker attacks

Articles about SS7 and Diameter convey a note of panic: cellular protocols are like a sieve, they cannot be abandoned and cannot be fixed. And yet, the telecom apocalypse has not yet happened. Cellular networks work, but how? We checked how and how effectively cellular operators protect signaling networks from hackers. One of the mobile […]

Black-box testing of cellular networks: how operators protect subscribers from hacker attacks Read More »

VMware makes Workstation Pro and Fusion Pro free for personal use

VMWare has made Workstation Pro and Fusion Pro free for personal use, allowing home users and students to set up their own virtualized test labs and play with another operating system at little to no cost. Things have been a little shaky since Broadcom completed its acquisition of VMware in November for $61 billion, with the company announcing the divestiture of its End-User Computing (EUC) Division, the end of perpetual licensing, and discontinuation

VMware makes Workstation Pro and Fusion Pro free for personal use Read More »

How to prevent Microsoft OneNote files from infecting Windows with malware

The seemingly innocuous Microsoft OneNote file has become a popular file format used by hackers to spread malware and breach corporate networks. Here’s how to block malicious OneNote phishing attachments from infecting Windows. To give a little background on how we got to Microsoft OneNote files becoming the tool of choice for malware-distributing phishing attacks,

How to prevent Microsoft OneNote files from infecting Windows with malware Read More »