ALL POSTS Tesla hires renowned security researcher Kristin Paget Jean Taggart February 7, 2014 0 Comments I follow car hacking pretty closely, having had a car PC in my automobile for a number of years and seeing… Going Phishing On A Facebook Apps Page Christopher Boyd February 6, 2014 0 Comments What is it? A Facebook Phish, lurking on an Apps page. Why is it a problem? Despite this scam method having… A Look at Malware with Virtual Machine Detection Joshua Cannell February 6, 2014 0 Comments It’s not uncommon for the malware of today to include some type of built-in virtual machine detection. Virtual Machines (VMs) are… Wi-Fi Can Spy? Leaks show CSEC tracked Wi-Fi users at Airports Jean Taggart February 5, 2014 0 Comments The CBC published a recently leaked document attributed to the CSEC, Communications Security Establishment Canada, showing that they used the free Wi-Fi networks at… Malwarebytes Now Accepts Bitcoins! Adam Kujawa February 5, 2014 0 Comments Over the last year, there have been massive amounts of news stories for and against Bitcoin being used as a currency…. The Rise of Android Scarevertising Armando Orozco February 4, 2014 0 Comments Android scareware, in the form of mobile advertising pop-ups alert to a potential infection on your device, are on the rise…. Localized malvertising affects some OpenDNS users Jérôme Segura February 3, 2014 0 Comments The Domain Name System (DNS) is the equivalent of the phone book for the Internet in that in translates host names… Job Application Mail Shows Great Potential (For Installing Something) Christopher Boyd February 3, 2014 0 Comments What is it? An email claiming to be about a job application will lead the recipients to potentially unwanted installs and… GFI Releases Report on 2013 Vulnerabilities Adam Kujawa February 3, 2014 0 Comments The best way to predict security trends in the oncoming year is to look back and see what went wrong in… Previous 1 … 555 556 557 558 559 … 592 Next Contributors Threat Center Podcast Glossary Scams