Showing 14 results for: Lab ×

Potential Windows Zero-Day On Sale to Highest Bidder

Ziv Mador, VP of security research at Trustwave, joined Trustwave Talks to discuss the fascinating discovery by his team of a potential Windows zero-day "local privilege escalation" vulnerability, which is being auctioned off in the cybercriminal underground to a single buyer at the starting asking price of $90,000.

Trustwave Opens New Ethical Hacking Lab

Trustwave researchers have a new space to perform their work – a new ethical hacking lab located inside the company's Chicago headquarters. Inside the lab, Trustwave researchers are breaking into ubiquitous devices used by businesses, such as ATMs, surveillance cameras and point-of-sale systems.

12 of the biggest things Trustwave did in 2013

This past year was an eventful one for Trustwave – as it was for the entire information security industry. As data breaches rolled on, malware advanced and compliance requirements stiffened, Trustwave responded with updated products and services, stronger-than-ever intelligence and expertise, and unwavering curiosity.

Two million stolen passwords: How to protect yourself

This week Trustwave security researchers uncovered a criminally controlled web server that contains nearly two million stolen account usernames and passwords for many popular sites, including Facebook, Twitter, LinkedIn, Google and Yahoo. Over the past few days, news outlets worldwide have reported on the discovery, and many people, including our customers, have questions about the malware, its impact and how they can protect themselves.

Toilet hacks: More relevant to enterprise security than you might think

As we call a wrap on another busy conference season, I've had some time to think about a question I've recently heard from more than one person. Last month, news outlets far and wide reported on an entertaining presentation one of our researchers did on hacking home automation devices, including, funnily enough, Japanese “smart” toilets. It was a fun piece of vulnerability research, but the natural question that came from all of the publicity was what the heck does hacking a flushable bowl have to do with enterprise security?

Ebook: Inside A Hacker's Playbook -- 10 Targeted Techniques That Will Break Your Security

As criminal hackers come up with more and more ingenious ways to take over Internet users' devices, break into corporate networks and steal sensitive information, keeping track of their methods becomes harder every day. How do they do research about their victims? What tactics do they use to home in on their targets to steal specific information? How do they keep themselves under the IT security radar?

Media Outlet Gets Hacked (On Purpose)

It only took an embroidered hat and polo shirt for Trustwave’s Senior Security Consultant Philip Pieterse to gain access to a media outlet’s offices, systems and private data. Posing as a telecommunications engineer, Pieterse walked into an office full of people, sat down at the Managing Director’s desk and downloaded a sensitive file. The Managing Director’s colleagues noticed Pieterse but didn’t say anything because they didn’t want to cause a stir.