People have become increasingly reliant on their mobile devices in recent years. Smartphones and tablets have revolutionized daily life. Unfortunately, such…
Month: August 2017
Earlier this month we held our quarterly Cybercrime Tactics and Techniques Q2 2017 webinar. This event gave thousands of security practitioners…
If you are the kind of person that uses different browsers or different devices to access websites, you may have noticed…
Last week, we gave some security tips for parents and kids aimed at the new school term. We also took a…
Recently, a researcher nicknamed MalwareTech famous from stopping the WannaCry ransomware got arrested for his alleged contribution to creating the Kronos…
We recently observed a fresh malicious spam campaign pushed through the Necurs botnet distributing so far, two new variants of Locky…
Last week, we explained how security certificates work and how malware authors have used them to block security software from being…
The time to start the new school term is just around the corner. And for parents, the excitement and anxiety may…
As a follow up to our study into the Magnitude exploit kit and its gate (which we profiled in a previous…
As a result of my PowerShell series [1],[2],[3], where I used the handling of certificates as an example, mainly because I…