Featured Blogs
Children’s Charity or CryptoMix? Details on This Ransomware Scam
As ransomware threats become more sophisticated, the tactics cybercriminals use to coerce payments from users become more targeted as well....
Chinese Cybercriminals Develop Lucrative Hacking Services
Underground cybercrime profits in China have likely already exceeded US$15.1 billion (100 billion Chinese yuan); caused more than $13.8 billion...
Chinese Trojan Hooks Macs, iPhones
“Distrust and caution are the parents of security”–Benjamin Franklin A recent threat targeting Chinese users of Mac OS X and...
Chinese Worm Infects Thousands of Android Phones
Last weekend, it was reported in China that an SMS worm was wildly spreading among Android mobile phones, with more...
Chip and PIN Credit Cards: More Secure, But Not Perfect
Not too long ago I discussed a big change coming to your credit and debit cards—the Chip and PIN system....
Chipotle’s Marketing Account Hacked: Protect Yourself From Phishing Lures
Over the past few years, food delivery apps have made it easy for people to get their favorite cuisines brought...
Christmas Shopping 2020
How To Stay Safe While Shopping Online This Holiday Season I’m pleased to report that I’ve achieved a number of...
Cidox Trojan Spoofs HTTP Host Header to Avoid Detection
Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP...
CIOs: You need to have the cloud talk with your staff
CIOs, it is time to have a frank and open discussion with your staff. This conversation may be difficult or...
