Memes are weird things and weren’t always about lolcats or frogs or whatever the latest terrible image macro doing the rounds…

I am thrilled to announce the launch of our next-generation product, Malwarebytes 3.0! This product is built to provide comprehensive protection…

Rootkits are tools and techniques used to hide (potentially malicious) modules from being noticed by system monitoring. Many people, hearing the…

From what we can gather from Check Point’s blog post, Gooligan is an already well-known threat with a new name hinted…

A newly discovered malicious app is found on China-made mobile devices running the Android OS. This is a baked-in system app…

That’s right, freezing apples, and we aren’t talking about a frost warning at your local apple orchard.A video has been found…

Most people associate malvertising with malware and the Windows platform. Indeed, the vast majority (and most damaging) attacks that happen thanks…

A new ransomware, TeleCrypt appeared recently carrying some new ideas. While most ransomware communicates with their C&C over simple HTTP-based protocols,…

Floki Bot, described recently by Dr. Peter Stephenson from SC Magazine, is yet another bot based on the leaked Zeus code. However,…

Let’s face it. We live in a completely different security world from a decade ago and the kinds of threats we…