Social media is fun. Posting pictures and sharing them with friends is a great technology. But please, we beg you, stop…
Month: June 2017
New social engineering scheme triggers on mouse movement
One of threat actors’ favorite malware delivery schemes is social engineering as it remains highly effective against a variety of targets….
LatentBot piece by piece
LatentBot is a multi-modular Trojan written in Delphi and known to have been around since 2013. Recently, we captured and dissected…
Adware the series, part 5
In this part of the series, we will be focusing on cases where the process we found as the one that…
Tech support scams: what are other people doing?
We’ve talked a lot about tech support scams over the past few years, typically focused on what we see ourselves, and…
Fireball Chinese malware and you
By now, you might have heard about an adware infection operation that has allegedly spread to 250 million systems called Fireball. The…
HTTPS… Everywhere!
We recently updated our redirections rule in HTTPS-Everywhere, a browser extension that automatically redirects you to the HTTPS version of the…
Interview with a malware hunter: Pieter Arntz
Welcome to our new series: interview with a malware hunter. In these Q&A sessions, we’ll take you behind the scenes to…
A week in security (May 29 – Jun 04)
Last week, we looked at a ransomware strain that appears to be a fake version of DMA Locker. We also focused on…
Spotting fake reviews – have healthy online skepticism
One of the most often pieces of advice I give when speaking to friends and relatives regarding online threats is to…