Featured Blogs
5 Cyber Safety Lifehacks for Families (5 Minutes or Less)
Raising a child to be a digitally discerning adult—while trying to slay our own online dragons—seems to take more hours...
Quarian Group Targets Victims With Spearphishing Attacks
This blog post was written by Rahul Mohandas. The current generation of targeted attacks are getting more sophisticated and evasive....
Hacking Summit Names Nations With Cyberwarfare Capabilities
In 2009, I read with great interest a paper published in the Journal of International Security Affairs titled The Art...
Ramnit Malware Creates FTP Network From Victims’ Computers
This blog post was written by Vikas Taneja. The Ramnit worm appeared in 2010. Within a year more than eight...
Is Dropbox Dropping in on Your Shared Files?
The ability to instantly share and interact through online sources has become an expected part of our daily lives. We...
Vertexnet Botnet Hides Behind AutoIt
Recently we found some new malware samples using AutoIt to hide themselves. On further analysis we found that those sample...
Why You Need to Teach Your Kids to be Careful What They Search For Online
With information and video access at their fingertips most teens spend a crazy amount of time online looking for the...
The Search for Celebrity Gossip Could Land Your Phone in Hot Water
They may be glamorous, but celebrities can make things quite ugly when it comes to the safety of your mobile...
SnapChat-Like Apps Hide Content on Twitter, Facebook
Just when parents figured out SnapChat, an app that makes photo texts disappear, two new apps hit the social scene that...
Mirror Mirror Online, Who Is the Most Dangerous Celebrity of Them All?
We all do it. We probably all just don’t admit it. Well I admit it—I’ve searched for that elusive picture...