Romance! Chocolates! Oversized novelty teddy bears!We won’t be covering any of those, but we will take a look at some of…
Year: 2014
Have you recently had a call come through, that suspiciously only rang once, and had the urge to call back?If you…
It’s quite common for malware to take code from the Windows API and use it for a malicious purpose.For example, VirtualAlloc…
The Citadel Trojan is nothing new, but I found one recently obtained from our collection systems and had a fun time…
It’s always a good idea to have browser Phish / Malware alert warnings enabled, because it can be the difference between seeing…
Poor old Flappy Bird, YOU WERE GONE TOO SOON.However, he’s back! Sort of.Actually, he isn’t back at all because fresh out…
Fake or rogue tech support companies are lurking everywhere.Whether they cold-call you or deceive you with ads and pop-ups, you need…
Online ads can be very aggressive and disruptive, not to mention they often carry malicious payloads aka malvertising.You may have come across…
I follow car hacking pretty closely, having had a car PC in my automobile for a number of years and seeing…
It’s not uncommon for the malware of today to include some type of built-in virtual machine detection.Virtual Machines (VMs) are an…