Malware authors are known to try various obfuscation techniques in order to hide their malware. The Unicode Right-to-Left trick (RLO), which has…

A few weeks ago, we wrote about an Android master key flaw discovered by Bluebox Labs that allowed modification of APK…

The post I wrote about the FBI Ransomware Now Targeting Apple’s Mac OS X users has received a lot of attention. Perhaps it…

Tumblr released an update for their iOS apps after a recently discovered security hole first reported by The Register discovered by one…

For years, Windows users have been plagued by ransomware demanding several hundred dollars to unlock their computers.The bad guys know there…

Tracking devices are not a new thing. You’ve seen them in film, where a secret agent (or Batman) bugs a criminal…

Facebook has slowly been rolling out a new search feature this year called Graph Search. This new ‘product’ is said to…

The New York Times posted an article today about a new game that is in development called ‘Data Dealer’. The goal…

About a month ago, I wrote a blog post explaining how malware can use process memory to its advantage, changing dramatically…

Recently our Josh Cannell wrote about a troubling vulnerability that could exist in 99 percent of Android devices where malware could…