We are not sure if this is going to be a new trend among browser hijackers, but it seems more than…
Month: August 2016
Systweak Redux: our response
On July 29, we published a blog titled “PUP Friday: Cleaning up with 5 star awards“, taking a look at a registry…
PokemonGo Ransomware comes with some clever tricks
We have all seen the current popularity and craze with PokemonGo, it’s no surprise cyber-criminals would plan on using this to…
A week in security (Aug 14 – Aug 20)
Last week, we published two blog posts about the Shakti Trojan: first, an overview of what it is (an information stealer…
PUP Friday: MacKeeper
MacKeeper first crossed my path more than five years ago. At that time, I was very active on Apple’s forums, and saw many…
PCVARK plays dirty
Recently, Jérôme Segura forwarded me a link to a fake virus scam page that seemed to be Mac-related. I began to…
Shakti Trojan: Technical Analysis
Recently, we took a look at the interesting Trojan found by Bleeping Computer. Our small investigation on its background and possible…
Parents, beware of this SMS scam
We’ve recently been alerted to a scam circulating within the UK and causing distress to parents or adults who knows someone…
Soldiering on: the $5.6 million 419 scam
419 scams most commonly drop into your mailbox, but they do occasionally appear via other channels such as snail mail and…
Exploit kit shakedown: RIG EK grabs Neutrino EK campaigns
Exploit kits are going through some strange phases these days. Two major malware distribution campaigns, namely Pseudo Darkleech and EITTest traditionally…