Recently, at the SAS conference I talked about “Funky malware formats”—atypical executable formats used by malware that are only loaded by…

Like-farming, aka like-harvesting, is a method used by commercial parties and scammers alike to raise the popularity of a site or…

We live in a world where more and more manufacturing processes are controlled by computers that send instructions to robots. This…

Long-time users of certain Microsoft products, such as Hotmail, MSN, and Outlook found they may be wrapped up in a hack…

By Adam Thomas and Jérôme Segura, with additional contributions from Vasilios Hioueras and S!Ri Since at least late December 2018, many…

Scammers are pushing multiple fake Facebook profiles of Ellen DeGeneres, popular US TV show host and producer, with the goal of…

Last week on Labs, we said hello to Baldr, a new stealer on the market, we wondered who is managing the…

We all want those Instagram likes and followers. Many apps on Google Play claim they can assist you with that effort….

In early March, cybersecurity professionals around the world filled the San Francisco Moscone Convention Center’s sprawling exhibition halls to discuss and…

One truth that is consistent across every sector—be it technology or education—is that software is vulnerable, which means that any device…