September 14, 2018 - It isn't tax season for UK (or US) residents, but that hasn't deterred scammers from sending out an HMRC phish double whammy with a tight deadline attached.
September 13, 2018 - Tech support scammers belonging to the Partnerstroka group are once again abusing browsers, this time with a new browlock feature to reel in more victims, in one of the biggest campaigns we've ever tracked.
September 6, 2018 - We take a look at what's going with gaming juggernaut Fortnite's decision to snub the Google Play store, why allowing installs from unknown sources on Android is a bad idea, and what the future might bring if such a setup ever catches on.
September 5, 2018 - Considering using spyware to surveil a cheating partner or keep an eye on the kiddos? Think again. Learn the telltale signs of spyware and why this suddenly mainstream malware needs to go back underground.
August 28, 2018 - Over the past few days, fans of singer Cardi B noticed her website was slowly filling up with spam. We take a look at what happened.
August 27, 2018 - Last spring, we found yet another piece of riskware on Google Play we call Android/PUP.Riskware.FakeGift. FakeGift does exactly what its name implies: gives its users fake gifts that can be redeemed for...absolutely nothing.
August 24, 2018 - Most online scams depend on two things: a legitimate entity that has a complicated or broken process, and a desperate target population. With immigration, you get both, which results in an environment ripe for green card scams.
August 17, 2018 - We feel compelled to relay the dire warning from this Barclays snail-mail letter, which we acquired through social media, therefore it must be true.
August 15, 2018 - We know what cybercriminals do. We know how they do it. Now we ask: why? This in-depth profile examines what makes hackers turn to cybercrime, and what could change their minds.
August 2, 2018 - Cybercriminals will do what it takes to get what they want, whether that's breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here's how to tell if you're susceptible to social engineering attacks, and what to do to combat them.