You know when you write about a Pokemon GO scam and casually mention how criminals use Lure Modules as bait for…

Kovter is a click-fraud malware famous from the unconventional tricks used for persistence. It hides malicious modules in PowerShell scripts as…

We blogged about the OSX.Backdoor.Eleanor malware that had just been discovered, last week.In rare turn of events in the Mac world,…

Last week, we discussed about another 419 scam, itemized 12 steps for secure online banking, differentiated two “intentional security holes”, spotlighted…

Virtual reality is when you wear a helmet and flail your arms around at a computer generated game, hopefully without walking…

Gone are the days of balancing check books. The advent of online banking has made budget-keeping and bill-paying a convenient, if…

Files that Malwarebytes Anti-Malware (MBAM) detect as OneClickDownloader are what we call bundlers. We have defined bundlers as a blend of…

I’ve seen some amazing claims of security in place on scam sites down the years, alongside dazzling statements with regards how…

Sinkholes and watering holes are two expressions not automatically associated with computer security, yet they are in use to describe two tactics…

Any organisation or individual can fall foul of a Twitter compromise, with Exhibit A being the feed for NASA’s Kepler. In case you…