Most Mac malware tends to be unsophisticated. Although it has some rather unpolished and awkward aspects, a new piece of Mac…
Month: April 2017
System optimizers turning to tech support scams
A new trend, which was also pointed out in our Q1 cybercrime report, is the combination of PUPs and Tech Support…
Terror EK going ‘pro’? Not quite yet
Since our last post on Terror EK, we haven’t really seen much activity from this exploit kit. However, in recent days…
Adware the series, part 1
In this series, we will be using the flowchart below to follow the process of determining which adware we are dealing…
A story of fonts by the EITest HoeflerText campaign
One of the most common malware campaigns from compromised websites is known as EITest and has traditionally been redirecting victims towards…
iCloud support scams
iCloud is an increasingly large target for scams of all kinds. It’s a common target for scams involving phishing e-mails. The…
How to fight security fatigue
We live in the age of the 24-hour news cycle. Each day, whether it’s from TV news, phone notifications, online browsing,…
Do I have Malwarebytes or a tech support scam?
A lot of companies don’t make clear who their tech support is, what their relationship to that group is, and what…
Mobile Menace Monday: Securing your privacy on Android
Whether you are a government employee with sensitive data stored on your mobile device or just a casual user that just…
A week in security (Apr 17 – Apr 23)
Last week, we doubled back on the Locky ransomware, seeing that it’s back. The good news is we still protect our…