ALL POSTS How to Unpack a Self-Injecting Citadel Trojan Joshua Cannell February 12, 2014 0 Comments The Citadel Trojan is nothing new, but I found one recently obtained from our collection systems and had a fun time… Tech support scams: Show me the money Jérôme Segura February 11, 2014 0 Comments Fake or rogue tech support companies are lurking everywhere. Whether they cold-call you or deceive you with ads and pop-ups, you… Flappy Bird Downloads Lead To Surveys Christopher Boyd February 11, 2014 0 Comments Poor old Flappy Bird, YOU WERE GONE TOO SOON. However, he’s back! Sort of. Actually, he isn’t back at all because… Ad2Store redirections: the latest annoyance for mobile users Jérôme Segura February 10, 2014 0 Comments Online ads can be very aggressive and disruptive, not to mention they often carry malicious payloads aka malvertising. You may have come… Tesla hires renowned security researcher Kristin Paget Jean Taggart February 7, 2014 0 Comments I follow car hacking pretty closely, having had a car PC in my automobile for a number of years and seeing… Going Phishing On A Facebook Apps Page Christopher Boyd February 6, 2014 0 Comments What is it? A Facebook Phish, lurking on an Apps page. Why is it a problem? Despite this scam method having… A Look at Malware with Virtual Machine Detection Joshua Cannell February 6, 2014 0 Comments It’s not uncommon for the malware of today to include some type of built-in virtual machine detection. Virtual Machines (VMs) are… Wi-Fi Can Spy? Leaks show CSEC tracked Wi-Fi users at Airports Jean Taggart February 5, 2014 0 Comments The CBC published a recently leaked document attributed to the CSEC, Communications Security Establishment Canada, showing that they used the free Wi-Fi networks at… Malwarebytes Now Accepts Bitcoins! Adam Kujawa February 5, 2014 0 Comments Over the last year, there have been massive amounts of news stories for and against Bitcoin being used as a currency…. Previous 1 … 553 554 555 556 557 … 590 Next Contributors Threat Center Podcast Glossary Scams