News and Media

VOTIRO HAS BEEN LISTED AS A FINALIST FOR THE 2018 INFOSEC AWARDS!

Winners of Coveted Information Security Awards to be announced during RSA Conference 2018 on April 16 in San Francisco, California
Read More

HACKERS NOW EXPLOITING WORD DOCUMENTS TO DISPLAY ‘INNOCENT’ VIDEOS THAT SECRETLY MINE CRYPTOCURRENCY

Hackers have been found exploiting Microsoft Word documents to deliver cryptojacking scripts to hijack victims’ computers and secretly mine cryptocurrency. Security researchers at Israel-based Votiro said the attack abuses Microsoft Word’s Online Video feature that allows users to insert remote videos directly into documents without having to embed them or...
Read More

HACKERS CAN NOW HIDE CRYPTOJACKING SCRIPTS IN MICROSOFT WORD DOCUMENTS

Microsoft Word documents can now be used by hackers to deliver a cryptojacking script—hijacking a victim’s computer to mine the cryptocurrency Monero. According to security researchers at Votiro, the attack utilizes Word’s Online Video feature to commandeer the CPU.
Read More

RESEARCHER: MICROSOFT WORD FEATURE CAN BE EXPLOITED TO DISPLAY VIDEOS THAT MINE CRYPTOCURRENCY

Malicious actors can abuse Microsoft Word’s Online Video feature to deliver videos that secretly exhaust their viewers’ computer processing power in order to mine cryptocurrencies, according to Israeli cybersecurity firm Votiro.
Read More

BUSINESSES NEED TO TAKE A PROACTIVE APPROACH TO CYBER SECURITY, SAYS VOTIRO CEO

As business attitudes towards cyber security mature, the software itself is getting smarter. Which-50 spoke to Itay Glick, the CEO of cyber security company Votiro and a former member of Israel Cyber Intelligence Unit, about the increasing importance of cybersecurity, why Australian organisations “need to do better” and how they can tackle the problem.
Read More

FILELESS MALWARE: NOT JUST A THREAT, BUT A SUPER-THREAT

It’s almost like something out of Star Trek. Imagine an alien who can see you, but whom you can’t see — one who has violence on his/her/its mind. A punch coming from out of nowhere; a vase flung at your head with no one seemingly throwing it; a punch to the...
Read More

THE DATA BREACH OF TOMORROW: WHAT TO EXPECT IN THE YEAR AHEAD

Companies have for years relied on the detection/response model - utilising technologies like anti-virus, sandboxes, and even EDR - to protect themselves but a change in emphasis from detection to prevention is predicted.
Read More

CYBERSECURITY OUTLOOK 2018: MORE OF THE SAME?

Take a deep breath, cybersecurity investors–2017 is almost over. Earlier in December, the Investing News Network (INN) reported on cybersecurity trends over the last year, which included the rising threats of cyberattacks and ransomware attacks which–unsurprisingly–are trends that aren’t going away any time soon.
Read More

THE PROBLEM WITH CYBERSECURITY REGULATIONS

Read More