Finding software vulnerabilities is a full-time job for some people, but for another group, discovering a flaw in popular software can…

The success of a malicious attack is determined by several factors including how well it is crafted and what its distribution…

If you read my post last week about some of the Malwarebytes team heading out to Las Vegas for DEFCON 21…

We knew about Java’s “Write once, run everywhere” mantra which very quickly turned into jokes like “Write once, pwn everywhere”. But…

An Exploit for Mozilla’s Firefox version 17 is making headlines, not simply because it is a zero-day but mainly because it…

Over the last few days two popular VOIP apps, Tango and Viber, had their servers breached that compromised customer data and…

Recently our Josh Cannell wrote about a troubling vulnerability that could exist in 99 percent of Android devices where malware could…

Whether you’re new to surfing the Internet or an old hand, we all know the importance of keeping our systems and…

My previous post about fake support calls from Microsoft generated a lot of reactions. I was quite astounded by how many…

Ransomware is still going strong and infecting countless PCs. We happened to stumble upon an interesting sample part of the Urausy…