• 15 de febrero de 2014
    2013 showed that the mobile threat landscape is slowly moving beyond apps. We saw infection and attack chains that didn’t solely rely on malicious app installation, including ads, PC malware, and spear-phishing emails. 2013 proved just how many tools cybercrim
  • 14 de febrero de 2014
    Attackers were found attacking the website of a non-profit organization in the United States with an Internet Explorer zero-day exploit. Microsoft confirms that this particular vulnerability affects IE9 and IE10. Here's what IE users should know.
  • 11 de febrero de 2014
    By the end of 2013, online banking malware, ransomware, malicious Android apps, and vulnerabilities stood out in the threat landscape. Questions arise as to how IoE will change this as threats advance towards smart devices.
  • 26 de enero de 2014
    Most online articles focus on the victims and the malware author, but the focus should be on how these attacks could have been prevented.
  • 17 de enero de 2014
    Brazil is experiencing an influx of CPL malware, a malicious variant of .CPL, a legitimate Windows Control Panel file. Cybercriminals are currently repurposing .CPL files to spread banking Trojans targeting Brazilian users.
  • 05 de diciembre de 2013
    Both threat actors and cybercriminals use the most advanced techniques to boost their attacks’ success rate, including hiding behind legitimate traffic. How can your local IT department catch them when they don’t rouse suspicion?
  • 15 de noviembre de 2013
    The number of malicious and high-risk Android apps reached 1 million with three months to spare in 2013. Where will the mobile threat landscape go from here?
  • 16 de septiembre de 2013
    Premium service abusers are so stealthy that you won't even know that your device is contacting premium numbers or doing other activities in the background that could cost you. Knowing how you can avoid them could save you from paying high prices.