If you’ve been reading the news lately, you’ve probably noticed the New York Times (NYT) website was defaced just two days…

Seeing advertising in your Android app is something we’re used to and for the most part we tolerate.But there are some…

I suppose we all saw this coming, ransomware authors are now posing as the NSA, claiming to be using the PRISM…

The bad guys have been working on social engineering end users with fake ‘Critical updates’ for all major web browsers.Last month,…

What happens when you bring millions of 18- to 24-year-olds onto college and university campuses and have them connect to shared…

The success of a malicious attack is determined by several factors including how well it is crafted and what its distribution…

Apple, for the most part, has been able to escape the wrath of malware authors compared with its main competitor, Android.When talking…

Yesterday, League of Legends developer Riot Games detailed in a blog post that accounts for their North American customers would require…

Scammers are at it again with their attempts to get users to download unnecessary software, visit pointless (and potentially dangerous) sites…

Recently, I posted a blog about analyzing PDF files. In that post, we covered some basics of the PDF format and…