Vivien Raoul

Recent Posts

Connected Objects, Vulnerable to Malicious Takeover

Posted by Vivien Raoul on March 27, 2018

In a few years, smart cars will become common and they will drive you wherever you want autonomously. We are not at that stage yet, but we can already control our entire house thanks to home automation. Heaters, lights, door-locks or CCTV are now connected items that can be managed remotely from a mobile phone or a tablet through a dedicated mobile application.

 

 

Read More

The Dark Web, pirates' supermarket

Posted by Vivien Raoul on February 27, 2018

We often hear about the dark web, the famous hidden face of the Internet whose webpages are not referred in the classical search engines and are only accessible from a dedicated browser. This secret portion of the web would be much larger in terms of size than its visible alter ego, which earned it to be regularly compared to the submerged part of an iceberg.

Read More

Mobile Apps: The Line Between Convenience & Data Leakage

Posted by Vivien Raoul on November 15, 2017

 

Read More

MTD, The Most Reliable Technology To Protect Your Mobile Devices

Posted by Vivien Raoul on September 15, 2017

In the 90’s, as the home PC market really took off, a bunch of viruses began to appear. Consequently, some companies developed antivirus softwares that would categorized known threats and block them.

Two decades later, mobile devices became the first point of access to the internet and not surprisingly, they started to attract hackers’ attention. To ward off mobile attacks, the first reflex everyone had was to keep using the same kind of protection that was used with PC: antiviruses. But quickly, threats became more advanced and their number kept growing, pushing the mobile security market to renew itself.

Read More

Overlay Malwares, Silently Stealing your Banking Credentials

Posted by Vivien Raoul on July 19, 2017

Overlay malware allows attackers to create an overlay to be displayed on top of legitimate Android applications. The overlay mimics the real app UI (User Interface) to trick users into entering sensitive data into a fake window that will collect and forward them to a remote attacker.

Read More