2016 was the year that reminded us how important prevention is, no matter what type of user you may be. Indeed…
Tag: malware
We often get asked about drive-by download attacks, how they work, and specifically about what sites people may have visited just prior to…
Source code of the infamous ZeuS malware leaked in 2011. Since that time, many cybercriminals has adopted it and augmented with…
VirLocker is in no way new, it has been making a mess of victim’s machines for quite a few years now….
This malware came in a phishing e-mail – disguised as a Bitcoin wallet. After clicking the link, user receives a JAR…
The first Mac malware of 2017 was brought to my attention by an IT admin, who spotted some strange outgoing network traffic from…
Ad fraud is one of many issues that contribute to the ad industry’s negative image these days. Unlike malvertising which affects…
Tech support scammers have been using various themes to push fake alerts to scare users into calling for assistance. These fall into…
From March 2016 we’ve observed the evolution of an interesting low-level ransomware, Petya – you can read about it here. The second…
In this blog post, we are going to take a closer look at some of the code that the most predominant…