ALL POSTS The Malware Archives: MS Office Files Joshua Cannell August 19, 2013 0 Comments Recently, I posted a blog about analyzing PDF files. In that post, we covered some basics of the PDF format and… Prison Door Glitch or Open Sesame Hack? Jean Taggart August 17, 2013 0 Comments In a scene straight out of a movie, a Florida prison suffered what they are presently calling a “computer glitch.” This… Fake Flash Player Update Causes Mayhem In Your Browser Jérôme Segura August 15, 2013 0 Comments UPDATE (08/22/13): Apple revoked the fake Flash Player’s certificate which effectively removes it from Safari. UPDATE (08/21/13): The bad guys are… Alleged Hacker Blackmails Miss Teen USA Joshua Cannell August 15, 2013 0 Comments News reports are coming in that 19-year-old Cassidy Wolf (above) has received emails from an alleged hacker attempting to extort her. Google Introduces Lost Phone Protection Armando Orozco August 14, 2013 0 Comments Two of the biggest security concerns for smartphone users are losing your device and having it stolen–they’re pocket-sized and can be… Malwarebytes AV Compatibility Report Adam Kujawa August 13, 2013 0 Comments A rule of thumb for antivirus users has always been that you do not run two AVs at the same time,… Lock – Unlock, Biometrics Failure Jean Taggart August 13, 2013 0 Comments I like gadgets, no, scratch that, I LOVE gadgets. With this in mind, I very often find myself an early adopter… Do You Own A Website? Now Would Be A Good Time to Patch It Jérôme Segura August 12, 2013 0 Comments WordPress & Joomla! in the bull’s eye If you run your own website – but not Blogger and other free ones… More on Subverting Automotive Computing Systems Jean Taggart August 9, 2013 0 Comments Last week I attended Defcon21, where in addition to hanging out with my most excellent co-workers, I had the opportunity to… Previous 1 … 583 584 585 586 587 … 602 Next Contributors Threat Center Podcast Glossary Scams