Featured Blogs
5 Cyber Safety Lifehacks for Families (5 Minutes or Less)
Raising a child to be a digitally discerning adult—while trying to slay our own online dragons—seems to take more hours...
Quarian Group Targets Victims With Spearphishing Attacks
This blog post was written by Rahul Mohandas. The current generation of targeted attacks are getting more sophisticated and evasive....
Hacking Summit Names Nations With Cyberwarfare Capabilities
In 2009, I read with great interest a paper published in the Journal of International Security Affairs titled The Art...
Ramnit Malware Creates FTP Network From Victims’ Computers
This blog post was written by Vikas Taneja. The Ramnit worm appeared in 2010. Within a year more than eight...
Is Dropbox Dropping in on Your Shared Files?
The ability to instantly share and interact through online sources has become an expected part of our daily lives. We...
Vertexnet Botnet Hides Behind AutoIt
Recently we found some new malware samples using AutoIt to hide themselves. On further analysis we found that those sample...
Why You Need to Teach Your Kids to be Careful What They Search For Online
With information and video access at their fingertips most teens spend a crazy amount of time online looking for the...
The Search for Celebrity Gossip Could Land Your Phone in Hot Water
They may be glamorous, but celebrities can make things quite ugly when it comes to the safety of your mobile...
SnapChat-Like Apps Hide Content on Twitter, Facebook
Just when parents figured out SnapChat, an app that makes photo texts disappear, two new apps hit the social scene that...
Mirror Mirror Online, Who Is the Most Dangerous Celebrity of Them All?
We all do it. We probably all just don’t admit it. Well I admit it—I’ve searched for that elusive picture...
Andromeda Botnet Hides Behind AutoIt
Last month, I posted a blog about an increase in the use of AutoIt scripts by malware authors to carry...
New Apps Make It Easy to Save SnapChats
The SnapChat smart phone app is one of the newest crazes for teens because it allows a user to send...
What is Encryption?
Encryption is the science of encoding and decoding secret messages. It began as cryptography—the ancient Greeks used it to protect...
Hackers are Cashing in on Instagram Likes
They say popularity has its price. This saying holds a new weight when it comes to the growing influence of...
Where, oh Where, Does That QR Code Lead?
What is square, flat, and black and white all over? If you answered “a QR Code”, you’re correct. One of...
Cidox Trojan Spoofs HTTP Host Header to Avoid Detection
Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP...
1-2-3: How to take a screen shot on your computer or mobile phone
There are some simple moves online that can save you an enormous amount of time. And when it comes to...
Mobile Bankers Beware: A New Phishing Scam Wants Your Money
As a growing number of smartphone owners get increasingly comfortable using their mobile devices for everything from shopping online to...
Bitcoin Headlines Attract Malware Developers
Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate. In the second quarter of...
Don’t Take a Bite out of that Apple Gift Card Scam
Good rule of thumb on the web: When it seems too good to be true, it probably is. Those ads...
BYOD: Balancing Convenience and Security
It lies next to you as you sleep, comes with you to work, rides home with you in your car...
What Are the Risks of Geo-Location?
Using your mobile’s built-in global positioning system (GPS) functionality allows location-based services (or geo-location) to locate and publish information about...
Spy? Where? Mobile Spyware Hiding Right Under Your Nose
Some days it feels like the whole world is going mobile. We tweet, we text, we browse the world from...
The Dilemma of Anonymity and Dangers of Ask.fm
Anonymity affords a precarious, irresistible power to teens online. Ask.fm is one app that’s exploding in popularity by allowing users...
Android App Contains Windows Worm
When developers are unaware of security they open the door to threats against their customers and users. We are not...
Java Back Door Acts as Bot
The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found...
Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code
Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware...