Blogs
- August 29, 2014Point of sales (PoS) malware in the form of BlackPOS have been seen in the wild, masquerading as an antimalware service. Our analysis found new code designed to avoid easy detection.
- August 29, 2014A case of spammers looking for legitimate ways to send spam. Our research shows an IP provider in Canada and several US-registered domains were found to be sending salad words spam.
- August 28, 2014A new variant of the backdoor BIFROSE, known for its keylogging techniques, was found in an attack against a device manufacturer. The malware was already elusive back in 2010, but its use of TOR to reach its servers makes it even harder to track.
- August 27, 2014Mobile malware continues to rise and vary - ransomware and bitcoin-mining malware emerge. Vulnerabilities in Android abound. Our review of the first half of 2014 reveals these results.
- August 25, 2014live casino online research shows that almost all Netis/Netcore routers have an open port that allows a knowledgeable attacker to exploit your computer and network. It may be time to replace your router.
- August 21, 2014FlashPack exploit kits that affected more than 60K Japanese users were found to be delivered via a compromised website add-on. The tool adds social media sharing buttons on a webpage that may lead to an Adobe Flash exploit.
- August 19, 2014Adware may seem annoying at best when all it does is create pop-up and pop-under ads on your screen. But some adware have hidden capabilities that deliver more harmful malware behind the scenes.
- August 19, 2014While the smartification of the home has its benefits, the growing number of smart devices also requires a lot of time and energy just to maintain and manage the network of connected devices. What does it take to play the role of “Administrator of Things“?