Banks are Using Biometric Measures to Protect Against Fraud
When thinking about biometric security, one might picture Mission Impossible-like retinal scanning or fingerprint reading technology a la the iPhone...
What is Browser Hijacking?
Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed or check out The...
What’s Your Click IQ?
The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be to have your...
Top 3 Phishing Attacks Use Similar Tricks
Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing...
BackOff Malware Uses Encryption to Hide Its Intentions
Often we see malware authors using encryption or obfuscation along with other techniques to modify the static contents of malware....
Nude Celebrity Photo Dump Has Many Asking What Happened
Hundreds of private photos belonging to several high-profile Hollywood actresses were posted online this past weekend. They are explicit in...
Are All Hackers Bad?
The word hacker has a pretty negative connotation. It brings to mind other words like cybercriminal, thief, and malicious. It’s...
Beware of the Risks of Online Gaming and Fantasy Football
August may mean the last days of summer vacation and start of back to school for some, but for die...
More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked
In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else. Everyone else is...
CryptoWall Ransomware Built With RC4 Bricks
Last month many Internet users were suddenly forced to trade in Bitcoins. This was not for general purposes–they were paying...