• August 18, 2014
    Over several months, our researchers monitored the Chinese mobile cybercriminal underground to see what kind of wares cybercriminals were trading. What they found was a diverse set of offerings created to suit different purposes.
  • July 15, 2014
    Cross-platform mobile threats are here to stay, and with their capability of jumping from a user's mobile device to their PC (and vice versa), protecting against them is a top priority.
  • July 15, 2014
    Nearly 40 of the top 50 free apps in Google Play now have fake counterparts available for download on both official and third-party app stores. These fake apps should not be taken lightly since cyberciminals are now using them in their schemes.
  • July 13, 2014
    Phishing sites, scams, and fake mobile apps - these are some of the cybercriminal schemes live casino online researchers found when huge sporting events are underway.
  • May 15, 2014
    Despite having more than 50 million downloads, Flappy Bird's developer abruptly took the game down from app stores. The takedown resulted in the emergence of similar apps in app stores and even auctions for devices with the app installed.
  • April 25, 2014
    Are you a digital hoarder? Unnecessary files can strain on your computer’s memory. But there are ways to rid your life of digital clutter. You can start by taking account of those things you use to access and exchange digital information.
  • April 25, 2014
    As you spend more time online—whether you’re sharing your thoughts, photos, stories, or simply browsing pages—you reveal more data than you think. Your normal browsing activities can actually become the very thing that violates your own privacy.
  • April 15, 2014
    We’ve seen 10 years of mobile malware. It’s about time we take a look at what may await us in the next 10.
  • April 14, 2014
    An average person manages at least three social media accounts, the most prominent one being Facebook. With around 829 million users, it’s no surprise that cybercriminals have taken a liking to it. With an ever-evolving interface and features, bad guys have no