Featured Blogs
LilyJade Version 2.0: a Malicious Browser Extension
In order to gain popularity and usability, web browsers offer extra features. Chief among these are browser plug-ins, which can...
Yahoo! Hacked: 15 Tips To Better Password Security
In light of the Yahoo Voices hack where 450,000 passwords have been compromised, it’s time again to let the world...
On July 9th Millions May Lose Access To Internet
As reported in March, the FBI has uncovered a network of rogue DNS servers and has taken steps to disable...
Combating Malware and Advanced Persistent Threats
In the past decade, the security industry has seen a constant rise in the volume of malware and attacks associated...
Operation High Roller Raises Financial Fraud Stakes
Earlier today Guardian Analytics and McAfee released the joint report “Dissecting Operation High Roller,” which describes a new breed of...
‘Bioskits’ Join Ranks of Stealth Malware
We have seen many discussions of the MyBios “Bioskit” discovered at the end of 2011. MyBios was the first malware...
Spreading the Flame: Skywiper Employs ‘Windows Update’
Microsoft has issued Security Advisory 2718704, in which the company disclosed that it recently became aware of the Flamer/Skywiper threat,...
‘Flame’ Has Been Lit in Cyberspace – What Consumers Should Know
This week, a new complex malware, known as Flame or Skywyper, was uncovered and has reportedly affected Iran’s energy sector....
Jumping Into the Flames of Skywiper
There has been quite a bit of analysis and speculation about the Flamer/Skywiper threat. As we started to analyze this...
What Does It Take To Be Digitally Secure?
Let’s get one thing straight: it’s no longer possible to deny that your life in the physical world and your...