Most Mac malware tends to be unsophisticated. Although it has some rather unpolished and awkward aspects, a new piece of Mac…

A new trend, which was also pointed out in our Q1 cybercrime report, is the combination of PUPs and Tech Support…

Since our last post on Terror EK, we haven’t really seen much activity from this exploit kit. However, in recent days…

In this series, we will be using the flowchart below to follow the process of determining which adware we are dealing…

One of the most common malware campaigns from compromised websites is known as EITest and has traditionally been redirecting victims towards…

iCloud is an increasingly large target for scams of all kinds. It’s a common target for scams involving phishing e-mails. The…

We live in the age of the 24-hour news cycle. Each day, whether it’s from TV news, phone notifications, online browsing,…

A lot of companies don’t make clear who their tech support is, what their relationship to that group is, and what…

Whether you are a government employee with sensitive data stored on your mobile device or just a casual user that just…

Last week, we doubled back on the Locky ransomware, seeing that it’s back. The good news is we still protect our…