This post is a sequel to Tech support scammers using Winlogon. As we have found after writing that post there are…
Year: 2016
Typosquatting is a term you may have seen when reading about Internet scams. In essence it relies on users making typing…
A lot of folks in the business (and consumer) world are shaking in their boots about ransomware. It’s understandable. Ransomware is…
Last week, we uncovered a truth about malvertising, briefed our readers on email spoofing, disclosed advanced phishing tactics used by PayPal…
Acer, well known manufacturer of laptops, TVs, and other goods, has announced a long-running breach (active for nearly a year), targeting…
We found a new piece of mobile malware, Android/Trojan.Pawost, that’s using Google Talk to make malicious calls.As soon as the malicious…
For those tracking exploit kits, the disappearance of the Angler exploit kit last week was a major event. While a lot of…
A variant of Android/Trojan.FakeApp is stealing the identities of popular applications (apps) such as TrueCaller and Torque Pro.As soon as the…
Email spoofing basically comes down to sending emails with a false sender address. This can be used in various ways by…
Phishers are back to using an old tactic in a new fashion to get hold of their victims’ credentials.One of the…