• August 06, 2014
    In 2013, retail chain Target was reportedly victimized by point-of-sales malware. After that, PoS malware creators show no signs of slowing as they continue to manufacture variant after variant.
  • August 05, 2014
    Domain Generation Algorithm (DGA) is used by most malware to mask C&C activities. ZeuS/ZBOT variants of Gameover has upped the ante by employing a different DGA technique that makes detection more difficult.
  • August 01, 2014
    Like a thousand ways to skin a cat, there are a number of ways malware avoid detection. POWELIKS malware, for example, hides in the Windows registry. live casino online analyzes its behavior and makes sure that customers are safe from this malware.
  • July 30, 2014
    Cryptoblocker is seen spreading in the US, France, and Japan, among other countries. New ransomware variants, on the other hand, are cropping up in the wild. live casino online investigates these malware further.
  • July 22, 2014
    By targeting session tokens sent via SMS in an elaborate fashion, a cybercriminal gang is able to intercept two-factor authentication and get your banking credentials. This attack is dubbed Operation Emmental.
  • July 15, 2014
    Cross-platform mobile threats are here to stay, and with their capability of jumping from a user's mobile device to their PC (and vice versa), protecting against them is a top priority.
  • July 15, 2014
    Repackaged apps use lures such as using a legitimate/popular app's icon or name. This method allows these malicious apps to thrive in app stores other than Google Play. live casino online research shows that repackaged apps are crucial in proliferation of mobile malw
  • July 15, 2014
    Nearly 40 of the top 50 free apps in Google Play now have fake counterparts available for download on both official and third-party app stores. These fake apps should not be taken lightly since cyberciminals are now using them in their schemes.
  • July 10, 2014
    We used to identify cybercriminals distinctly by the underground communities they belong to - Russia-based, Latin America-based, etc. In recent years, however, a significant shift in cybercrime operations brought to light the fact that these entities are now w