Wearable computing is a hot topic as of late. From smart watches like the rumored Samsung Galaxy Gear, to augmented reality, what was…
Month: August 2013
If you’ve been reading the news lately, you’ve probably noticed the New York Times (NYT) website was defaced just two days…
Rich Matteo, a researcher here at Malwarebytes, came across an interesting sample that erases files and leaves a not-so-friendly message to…
Seeing advertising in your Android app is something we’re used to and for the most part we tolerate. But there are…
I suppose we all saw this coming, ransomware authors are now posing as the NSA, claiming to be using the PRISM…
What happens when you bring millions of 18- to 24-year-olds onto college and university campuses and have them connect to shared…
The bad guys have been working on social engineering end users with fake ‘Critical updates’ for all major web browsers. Last…
The success of a malicious attack is determined by several factors including how well it is crafted and what its distribution…
Apple, for the most part, has been able to escape the wrath of malware authors compared with its main competitor, Android. When…
Yesterday, League of Legends developer Riot Games detailed in a blog post that accounts for their North American customers would require…