September 5, 2018 - Considering using spyware to surveil a cheating partner or keep an eye on the kiddos? Think again. Learn the telltale signs of spyware and why this suddenly mainstream malware needs to go back underground.
July 25, 2018 - We take a fresh look at Trojans: the history of the term, the most popular threats over the years, the different types of Trojans, and their relationship with social engineering.
June 27, 2018 - The World Cup is in full swing, and attackers are busy both on and off the pitch. Which of the competing nations are under fire from malware authors? Who is sailing through qualifying rounds mostly untouched? What are the most popular threats in the midst of the biggest footballing nations? Read on to find out.
June 13, 2018 - We take a look at VPNFilter malware, which is still out there and causing trouble for certain models of routers worldwide. What is it? And is your device on the list? Read on.
May 1, 2018 - We take a look at SamSam ransomware, the malware that messed with Atlanta, and tell you how it works and what you can do to combat it.
February 28, 2018 - In this case study on ShiOne ransomware, part of our Encryption 101 series, we will be reviewing the encryption process line by line and showing the different methods ransomware can use to encrypt files.
February 26, 2018 - From malware coin miners to drive-by mining, we review the state of malicious cryptomining in the past few months by looking at the most notable incidents and our own telemetry stats.
February 13, 2018 - New malicious apps appear in Google Play abusing Kotlin, the "safest" official programming language for the Android.
November 29, 2017 - If you think closing your browser window to leave a site that runs a cryptominer will stop the mining process, think again. Persistent drive-by cryptomining has arrived.
November 2, 2017 - Cybercriminal activity continues to be heavily targeted toward the US and Europe. But emerging APAC markets are even more susceptible to malware attack. Here's why.