In this series of posts, we will be using the flowchart below to follow the process of determining which adware we are dealing…

Last week we informed you about several new threats, including the android ransomware that targets Tencent users. This SLocker.fh masquerades as…

Ransomware has become a popular criminal business with a relatively easy entrance. Even the people with little technical knowledge can build…

Given the recent renewed attention about ‘RoughTed’ and Kafeine‘s tweet, we wanted to clarify that RoughTed and associated domains are in fact part…

Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. A SQL injection is a SQL injection, no matter…

Security researcher Bosko Stankovic recently published an article explaining how an attacker could use Chrome, the SMB file sharing protocol, and…

Early this April, an increase of infection rates by a variant of ransomware known as Android/Ransom.SLocker.fh was seen. Ransomware targets Tencent users…

Last week was dominated by the WannaCry ransomware and the discussions ensuing it. We published: Others discussed: In other news we…

There are several different types of malware that look for interesting information on an infected computer and transmit that information to…

The Asia Pacific Privacy Authorities (APPA) began an initiative called Privacy Awareness Week, or PAW, with the purpose of educating users…