Featured Blogs
Myth: Apple Products Don’t Get Viruses
Have you ever bitten into an apple and found a worm? I have, and it’s yummy! Anyway, how many times...
Guide To Online Banking Safety for Confident Consumers
A recent poll revealed that 54% of U.S. consumers said the theft of their personal or financial information worried them...
Why Does My Car Have Its Own Smartphone?
You would be surprised at the number of places you can find a GSM SIM card. Outside of your mobile phone,...
Spitmo vs Zitmo: Banking Trojans Target Android
SpyEye and Zeus are probably the most prevalent and active Trojan “banker” families seen in the wild. (Bankers steal bank...
Rooting Exploit for Android Works Silently
In our last blog about Android malware, we discussed the expanding threat landscape for Android malware. Recently, we received an...
No Winners at QR Code Roulette
Last year a friend had a bright idea for a party game that involved a series of QR codes in...
The Day of the Golden Jackal – The Next Tale in the Stuxnet Files: Duqu Updated
Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the...
Satanbot Employs VBScript to Create Botnet
Malware is on the rise. At the beginning of 2008, our malware collection had 10 million samples. Today we have...
French Magazine Suffers Web Hack, Firebombing
To celebrate the recent victory of the Tunisian Islamist party, the French satirical magazine “Charlie Hebdo” published a special issue...