Recently we got access to several elements of the espionage toolkit that has been captured attacking Vietnamese institutions. During the operation,…
Year: 2016
Advances in networking and mobile technologies have enabled remote workforces on a global scale, whether that’s employing full-time staff members who…
We are not sure if this is going to be a new trend among browser hijackers, but it seems more than…
Last week, we published two blog posts about the Shakti Trojan: first, an overview of what it is (an information stealer…
We have all seen the current popularity and craze with PokemonGo, it’s no surprise cyber-criminals would plan on using this to…
On July 29, we published a blog titled “PUP Friday: Cleaning up with 5 star awards“, taking a look at a registry…
Recently, Jérôme Segura forwarded me a link to a fake virus scam page that seemed to be Mac-related. I began to…
MacKeeper first crossed my path more than five years ago. At that time, I was very active on Apple’s forums, and saw many…
We’ve recently been alerted to a scam circulating within the UK and causing distress to parents or adults who knows someone…
Recently, we took a look at the interesting Trojan found by Bleeping Computer. Our small investigation on its background and possible…