ALL POSTS New App Fixes Bluebox Android Vulnerability, But Requires Root Joshua Cannell July 18, 2013 0 Comments A few weeks ago, we wrote about an Android master key flaw discovered by Bluebox Labs that allowed modification of APK… Tumblr Security Hole Reveals Passwords Armando Orozco July 17, 2013 0 Comments Tumblr released an update for their iOS apps after a recently discovered security hole first reported by The Register discovered by one… Q&A About The Latest HTML Ransomware Affecting Mac OS X users Jérôme Segura July 17, 2013 0 Comments The post I wrote about the FBI Ransomware Now Targeting Apple’s Mac OS X users has received a lot of attention. Perhaps it… FBI Ransomware Now Targeting Apple’s Mac OS X Users Jérôme Segura July 15, 2013 0 Comments For years, Windows users have been plagued by ransomware demanding several hundred dollars to unlock their computers.The bad guys know there… Tile: Crowdsourcing Lost Keys Or Pseudo GPS Stalking On The Cheap? Jean Taggart July 12, 2013 0 Comments Tracking devices are not a new thing. You’ve seen them in film, where a secret agent (or Batman) bugs a criminal… Facebook’s Graph Search: Personal Information Search On Steroids For The Masses Jérôme Segura July 11, 2013 0 Comments Facebook has slowly been rolling out a new search feature this year called Graph Search. This new ‘product’ is said to… Data Dealer Opens Minds and Virtual Wallets Adam Kujawa July 10, 2013 0 Comments The New York Times posted an article today about a new game that is in development called ‘Data Dealer’. The goal… UPDATE: New Android Vulnerability Affects 99 percent of Devices Armando Orozco July 9, 2013 0 Comments Recently our Josh Cannell wrote about a troubling vulnerability that could exist in 99 percent of Android devices where malware could… My Memory Isn’t What It Used To Be: Part 2 Joshua Cannell July 9, 2013 0 Comments About a month ago, I wrote a blog post explaining how malware can use process memory to its advantage, changing dramatically… Previous 1 … 601 602 603 604 605 … 617 Next Contributors Threat Center Podcast Glossary Scams