Macro Malware Targets Macs
Macro malware has been spreading for years. New techniques arise all the time to hide malicious code and thus increase...
McAfee Launches ‘Threat Landscape Dashboard’
Every week, we read in the news of another breach or targeted campaign, as more patches are released to protect...
Five Reasons Why True Key Is Our Knight in Shining Armor
Has it ever happened to you that you tried to log into an account only to find that you seem...
Spotlight on Shamoon
Our analysis this month has pointed to Shamoon emerging in the Middle East. We have recently seen a number of...
With Release of Windows 10, Questions About BitLocker Arise Again
This post was written by Ted Pan. For those of you who were around during the original release of Microsoft’s...
Raising Kids in a Digital World: Top Takeaways from Our 2017 Connected Family Survey
Today’s world is certainly a digital one. Everything, from the stores where we shop to the messages we send to...
Doctoring Data: Why Cybercriminals Have Their Eye on Healthcare
Fun fact: your healthcare data is worth roughly 10 times as much as your credit card number. Well, to a...
Stopping Malware With a Fake Virtual Machine
As we explained in a previous post, some advanced malware can detect a virtual environment such as a sandbox to...
Trojanized Photo App on Google Play Signs Up Users for Premium Services
Mobile apps usually have names that give some indication of their function. In one recent case, however, we found a...
The Most Important Mobile Security Resolutions for 2017
January gets a bad rap. A dreary month, the air is bitterly cold, and the days are so short that...