Cybercriminals are increasingly using malicious advertisements as a platform for spreading malware. Find out how they work how you can protect yourself from these online threats.
Exploit kits have been around since 2006, and have been continuously evolving to take advantage of vulnerabilities found on popular software. This research paper discusses what exploit kits are, how they work, and how they evolved over time.
A large number of repackaged Android apps have been showing up in Chinese app stores pretending to be "free”, but they still cost the users through various ads and subscriptions to various premium SMS services.
A number of high-profile attacks on retail companies made the news last year, many of which targeted point-of-sale systems, a decades-old payment mechanism used by countless retailers worldwide. Find out more.
Is your Android device updated? Here's a look into the different Android versions, the major flaws that affected them, and the new security features on the latest version.
This research paper discusses how PoS RAM scrapers infect systems and exfiltrate stolen data, and provides a list of strategies and techologies that can be used to defend against the threat.
BEDEP malware has recently gained notoriety in the threat landscape after it played a part in two different zero-day exploits affecting Adobe Flash in early 2015. This technical paper tackles its routines and capabilities, as well as its impact.
A year ago, we predicted that boundaries will be blurred when it comes to cybercrime and targeted attacks. With the steady rise of consumerization in the workplace, mobile devices will increasingly be abused to get to an attacker's target.
An Android Trojan app called PowerOffHijack, which originated from Chinese app stores, was found tricking users into believing that their devices were turned off though they're actually powered on.