ALL POSTS The Facts about Botnets Pieter Arntz February 6, 2015 0 Comments What is a botnet?Although not malware themselves and originally even designed to be helpful, botnets are currently considered the biggest threat… Get the Drop on…Dead Drops Christopher Boyd February 6, 2015 0 Comments I’ve always been fascinated by the occasional mashup of security and art, and the last few years have given us some great examples. In… Gamers Targeted with Fake In-Game Comms Apps Christopher Boyd February 5, 2015 0 Comments Playing games online with your friends can lead to frustration where teamwork and coordination are concerned – if you’re not paired… Logging In and Captcha Pieter Arntz February 4, 2015 0 Comments What is Captcha?CAPTCHA (“Completely Automated Public Turing test to tell Computers and Humans Apart”) is one of the annoyances that we… HanJuan EK fires third Flash Player 0day Malwarebytes Labs February 3, 2015 0 Comments A new Adobe Flash zero-day, the third one this year so far, has been found in the wild via drive-by download… Google Chrome update Spam drops CTB Locker/Critroni Ransomware Jérôme Segura February 2, 2015 0 Comments Beware of emails appearing to come from Google warning you that “Your version of Google Chrome is potentially vulnerable and out… 10 tips to maintain an online presence in a privacy-hostile world Jérôme Segura February 2, 2015 0 Comments Online privacy is such a hot topic these days due in large part to the recent revelations about the NSA which… Safe Practices with Your Mobile Device Nathan Collier February 1, 2015 0 Comments After weeks of tortuous waiting to get your new Android device, it’s finally here!You immediately plug it in, power it up, and… Hardening Firefox Jean Taggart January 31, 2015 0 Comments In this post, we will explore some techniques, methods, and tools to increase the security stance of the Firefox web Browser.Don’t… Previous 1 … 536 537 538 539 540 … 614 Next Contributors Threat Center Podcast Glossary Scams