• August 27, 2014
    Mobile malware continues to rise and vary - ransomware and bitcoin-mining malware emerge. Vulnerabilities in Android abound. Our review of the first half of 2014 reveals these results.
  • August 26, 2014
    Learn about the biggest mobile threats and more from the first half of 2014.
  • August 14, 2014
    Scrutinize that Google Drive or Dropbox link before clicking. Spam could be used to distribute backdoors; in this case, the message includes a link that points to a Google Drive URL.
  • August 12, 2014
    A closer look at the security landscape during 2Q 2014, as various industry players turned the tables on cyber attacks such as Heartbleed and DDoS.
  • August 12, 2014
    Security issues such as the Heartbleed bug and a number of huge data breaches were the main attractions of the second quarter of 2014. Targeted industries and security companies responded in varying fashion, all in the name of protecting end-users.
  • August 06, 2014
    In 2013, retail chain Target was reportedly victimized by point-of-sales malware. After that, PoS malware creators show no signs of slowing as they continue to manufacture variant after variant.
  • August 05, 2014
    Domain Generation Algorithm (DGA) is used by most malware to mask C&C activities. ZeuS/ZBOT variants of Gameover has upped the ante by employing a different DGA technique that makes detection more difficult.
  • August 01, 2014
    Like a thousand ways to skin a cat, there are a number of ways malware avoid detection. POWELIKS malware, for example, hides in the Windows registry. live casino online analyzes its behavior and makes sure that customers are safe from this malware.
  • July 30, 2014
    Cryptoblocker is seen spreading in the US, France, and Japan, among other countries. New ransomware variants, on the other hand, are cropping up in the wild. live casino online investigates these malware further.