Emma Watson Video Scam: Hackers Use Celeb’s Popularity to Unleash Viruses
Following the announcement of the 2014 Most Dangerous Celebrities™ earlier this month, our senses have been heightened to scams on...
What is Browser Hijacking?
Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed or check out The...
The Hacker’s New Best Friend Could be Your USB Port
It’s tiny and portable, yet perfect for storing large items. I’m talking about the good ol’ Universal Serial Bus (a.k.a...
What’s Your Click IQ?
The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be to have your...
BackOff Malware Uses Encryption to Hide Its Intentions
Often we see malware authors using encryption or obfuscation along with other techniques to modify the static contents of malware....
CelebGate: a Long, Dangerous List of Celebrities
During the past few days, the media has been abuzz with the massive celebrity photo leak nicknamed CelebGate 2014. The...
Are All Hackers Bad?
The word hacker has a pretty negative connotation. It brings to mind other words like cybercriminal, thief, and malicious. It’s...
Beware of the Risks of Online Gaming and Fantasy Football
August may mean the last days of summer vacation and start of back to school for some, but for die...
Trailing the Trojan njRAT
One Trojan that just won’t go away is the remote access tool njRAT. Microsoft recently took down a leading domain...
Chinese Worm Infects Thousands of Android Phones
Last weekend, it was reported in China that an SMS worm was wildly spreading among Android mobile phones, with more...