A new and currently unpatched flaw affecting Internet Explorer 10 (CVE-2014-0322) has been discovered on some highly targeted websites, indicating a…

This week, news came out that Silk Road 2, the underground marketplace specializing in nefarious services, had all of its Bitcoins…

It’s quite common for malware to take code from the Windows API and use it for a malicious purpose. For example,…

Have you recently had a call come through, that suspiciously only rang once, and had the urge to call back? If…

Romance! Chocolates! Oversized novelty teddy bears! We won’t be covering any of those, but we will take a look at some…

The Citadel Trojan is nothing new, but I found one recently obtained from our collection systems and had a fun time…

Fake or rogue tech support companies are lurking everywhere. Whether they cold-call you or deceive you with ads and pop-ups, you…

Poor old Flappy Bird, YOU WERE GONE TOO SOON. However, he’s back! Sort of. Actually, he isn’t back at all because…

Online ads can be very aggressive and disruptive, not to mention they often carry malicious payloads aka malvertising. You may have come…