Featured Blogs
1-2-3: How to take a screen shot on your computer or mobile phone
There are some simple moves online that can save you an enormous amount of time. And when it comes to...
Cidox Trojan Spoofs HTTP Host Header to Avoid Detection
Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP...
Where, oh Where, Does That QR Code Lead?
What is square, flat, and black and white all over? If you answered “a QR Code”, you’re correct. One of...
Hackers are Cashing in on Instagram Likes
They say popularity has its price. This saying holds a new weight when it comes to the growing influence of...
What is Encryption?
Encryption is the science of encoding and decoding secret messages. It began as cryptography—the ancient Greeks used it to protect...
New Apps Make It Easy to Save SnapChats
The SnapChat smart phone app is one of the newest crazes for teens because it allows a user to send...
Andromeda Botnet Hides Behind AutoIt
Last month, I posted a blog about an increase in the use of AutoIt scripts by malware authors to carry...
Mirror Mirror Online, Who Is the Most Dangerous Celebrity of Them All?
We all do it. We probably all just don’t admit it. Well I admit it—I’ve searched for that elusive picture...
SnapChat-Like Apps Hide Content on Twitter, Facebook
Just when parents figured out SnapChat, an app that makes photo texts disappear, two new apps hit the social scene that...