This post is a sequel to Tech support scammers using Winlogon. As we have found after writing that post there are…

Typosquatting is a term you may have seen when reading about Internet scams. In essence it relies on users making typing…

A lot of folks in the business (and consumer) world are shaking in their boots about ransomware. It’s understandable. Ransomware is…

Last week, we uncovered a truth about malvertising, briefed our readers on email spoofing, disclosed advanced phishing tactics used by PayPal…

Acer, well known manufacturer of laptops, TVs, and other goods, has announced a long-running breach (active for nearly a year), targeting…

We found a new piece of mobile malware, Android/Trojan.Pawost, that’s using Google Talk to make malicious calls.As soon as the malicious…

For those tracking exploit kits, the disappearance of the Angler exploit kit last week was a major event. While a lot of…

A variant of Android/Trojan.FakeApp is stealing the identities of popular applications (apps) such as TrueCaller and Torque Pro.As soon as the…

Email spoofing basically comes down to sending emails with a false sender address. This can be used in various ways by…

Phishers are back to using an old tactic in a new fashion to get hold of their victims’ credentials.One of the…