A detailed look into the security threats in the ANZ region that were prevalent in 2014, as well as the various trends and user behavior that could have contributed or shaped its threat landscape.
A closer look at a one-man operation that managed to steal more than 22,000 credit card numbers in a month using PoS malware. Learn more about the changing dynamics of the underground PoS malware economy in this research paper.
Security awareness is always the first step to digital safety. But what if cybercriminals used this sentiment to lure victims into downloading malware?
Sextortion operations aren't new, but a new modus operandi that makes use of malware and mobile devices is emerging in East Asia. This research paper offers an in-depth look at the operation, its perpetrators, as well as their tools and methods.
In an effort to prevent users from thinking that iOS 8 has exploitable flaws, Apple is reportedly cracking down on antimalware products in the iOS App Store. How will the move affect its users?
Cybercriminals are increasingly using malicious advertisements as a platform for spreading malware. Find out how they work how you can protect yourself from these online threats.
Exploit kits have been around since 2006, and have been continuously evolving to take advantage of vulnerabilities found on popular software. This research paper discusses what exploit kits are, how they work, and how they evolved over time.
This research paper discusses how PoS RAM scrapers infect systems and exfiltrate stolen data, and provides a list of strategies and techologies that can be used to defend against the threat.