Results for 'porn'

Exploits and vulnerabilities | News | Threats

Bad Guys Gone Greedy: Multi-Pronged Attacks Found in the Wild

August 24, 2013 - The success of a malicious attack is determined by several factors including how well it is crafted and what its distribution...

CONTINUE READING
News | Threats

Fake Flash Player Update Causes Mayhem In Your Browser

August 15, 2013 - UPDATE (08/22/13): Apple revoked the fake Flash Player’s certificate which effectively removes it from Safari. UPDATE (08/21/13): The bad guys are...

CONTINUE READING
Exploits and vulnerabilities | News | Threats

Firefox Zero-Day Used to Reveal Identities: Does The End Justify The Means?

August 5, 2013 - An Exploit for Mozilla’s Firefox version 17 is making headlines, not simply because it is a zero-day but mainly because it...

CONTINUE READING
Cybercrime | News

SMS Scams: How To Defend Yourself

July 30, 2013 - Who doesn’t own a mobile phone nowadays? Whether you have an old-school flip phone or a newer smartphone, you may already...

CONTINUE READING
Apple | Exploits and vulnerabilities | News | Threats

Q&A About The Latest HTML Ransomware Affecting Mac OS X users

July 17, 2013 - The post I wrote about the FBI Ransomware Now Targeting Apple’s Mac OS X users has received a lot of attention. Perhaps it...

CONTINUE READING
Apple | Exploits and vulnerabilities | News | Threats

FBI Ransomware Now Targeting Apple’s Mac OS X Users

July 15, 2013 - For years, Windows users have been plagued by ransomware demanding several hundred dollars to unlock their computers. The bad guys know...

CONTINUE READING
Explained | News

Patching the End User: How to Recognize the Social Engineering In Scams

June 11, 2013 - Scammers use psychological manipulation to defraud their victims, so it is extremely useful to be able to identify the social engineering elements...

CONTINUE READING
News

Oh, the sites you will never see

May 20, 2013 - Staying safe online requires more than just avoiding websites that look untrustworthy. These days, you might be infected with malware by...

CONTINUE READING
Cybercrime | News

Ransomware

December 7, 2012 - …because some malware is too heinous for clever puns. Ransom software or Ransomware, takes advantage of our constant need for information,...

CONTINUE READING
Explained | News

Much Ado About Browser Malware

September 24, 2012 - Browser Malware is a constant problem for all computer users. In addition to being highly intrusive and sometimes difficult to remove,...

CONTINUE READING