ALL POSTS Bug bounties and the price of security Adam Kujawa December 19, 2013 0 Comments In a recent article on the NSS Security blog, Stefan Frei discusses a potential standard for bug bounty programs and how it could… Browser Ransomware hides behind CloudFlare, smartens payment system Jérôme Segura December 19, 2013 0 Comments We’ve covered the browser-based ransomware several times before on this blog, ever since it appeared back in July and again each… Another Day, Another PUP Joshua Cannell December 18, 2013 0 Comments Just when I thought I would be finished writing about PUPs for a bit, I came across a pop-up advising me… Amazon Invoice Malware Spam run Continues Christopher Boyd December 18, 2013 0 Comments I had a few mails land in a spamtrap of mine over the last few days, part of an ongoing spam… Temporary Tech? Permanent Fail Christopher Boyd December 17, 2013 0 Comments Not so long ago, I went up a mountain. A mountain which, you may be interested to know, sits roughly 5,000… Miner Madness! Adam Kujawa December 16, 2013 0 Comments Over the past few weeks, I am certain that you have heard your fair share about Bitcoin and not just from… Fake VPN Site Serves Up Keylogger Christopher Boyd December 16, 2013 0 Comments VPN services have probably never been in more demand with the continued fallout of the Snowden / NSA revelations. They’re certainly… File extensions Pieter Arntz December 14, 2013 0 Comments What are file extensions?A file extension (or simply “extension”) is the suffix at the end of a filename that indicates what… SMS Activated Flash Downloads: A Digital Leap of Faith Christopher Boyd December 13, 2013 0 Comments We recently poked some fake Flash files with a stick which attempted to turn a PC into an exercise in coin… Previous 1 … 582 583 584 585 586 … 614 Next Contributors Threat Center Podcast Glossary Scams