Recently we got access to several elements of the espionage toolkit that has been captured attacking Vietnamese institutions. During the operation,…

Advances in networking and mobile technologies have enabled remote workforces on a global scale, whether that’s employing full-time staff members who…

We are not sure if this is going to be a new trend among browser hijackers, but it seems more than…

Last week, we published two blog posts about the Shakti Trojan: first, an overview of what it is (an information stealer…

We have all seen the current popularity and craze with PokemonGo, it’s no surprise cyber-criminals would plan on using this to…

On July 29, we published a blog titled “PUP Friday: Cleaning up with 5 star awards“, taking a look at a registry…

Recently, Jérôme Segura forwarded me a link to a fake virus scam page that seemed to be Mac-related. I began to…

MacKeeper first crossed my path more than five years ago. At that time, I was very active on Apple’s forums, and saw many…

We’ve recently been alerted to a scam circulating within the UK and causing distress to parents or adults who knows someone…

Recently, we took a look at the interesting Trojan found by Bleeping Computer. Our small investigation on its background and possible…