August 16, 2016 - 419 scams most commonly drop into your mailbox, but they do occasionally appear via other channels such as snail mail and social media. Today we're going to take a look at an angle seemingly beloved of scammers everywhere - a specific character type clung to down the years for no other reason than to cheat people out of their money.
August 15, 2016 - Something unusual happened in the exploit kit ecosystem. Two well-known malware distribution campaigns switched from Neutrino EK to RIG EK. A temporary blip or a more durable change? Only time will tell.
August 15, 2016 - Recently, Bleeping Computer published a short article about an unrecognized Trojan that grabs documents from the attacked computer and uploads them into a malicious server. Looking at the characteristics of the tool, we suspect that it has been prepared for the purpose of corporate espionage. So far, no AV has given any meaningful identification to this malware—it is detected under generic names. Since not much is known about its internals, we decided to take a closer look.
August 15, 2016 - A compilation of notable security news and blog posts from August 07th to August 13th. This week, we talked about a Facebook hoax, a Twitter scammer, a couple of ransomware, and an uncommon malvertising tactic.
August 12, 2016 - The current cyberthreat landscape is an ever dynamic threat, we have state-sponsored cyberthreats and very sophisticated cybercriminals to defend against. These threats come with their own motivations and objectives. We have all come to know ransomware, which, according to our study published earlier this month, has become one of the biggest cybersecurity threats in the...