With the retirement of support for Windows XP, a large number of users are left in the position to either upgrade…

Update (03/21/2014): We received an email from beeg[dot]com’s owner: Subject: We need you urgent attention. Your last blog post hey guys,  we…

This was the third and final day of the CanSecWest conference. To keep with our weather theme, yes, it did finally…

What is it? A site claiming to offer up a tool designed to grab WhatsApp user messages.What does it do? Installs…

Update (02/24/14): This exploit has been found in the wild already. It is blocked by Malwarebytes Anti-Exploit.In a very busy month for…

A new and currently unpatched flaw affecting Internet Explorer 10 (CVE-2014-0322) has been discovered on some highly targeted websites, indicating a…

Researchers from Ben-Gurion University’s security lab (BGU) discovered a vulnerability in the Samsung Galaxy S4’s Knox architecture. If exploited, the attacker…

Like many other social networking sites, Tumblr is a hot spot for malware infections, spam and other security issues.I thought this…

In a recent article on the NSS Security blog, Stefan Frei discusses a potential standard for bug bounty programs and how it could…

$2,139,200 US Dollars (70 million Roubles).That’s the amount the Russian Interior Ministry claims the Blackhole exploit kit has been responsible for damage-wise.  After…