Drive-by mining and ads: The Wild Wild West

Cryptomining in the browser is all the rage lately. But what are the impacts for users when it is being abused by dubious publishers?

Read more

Explained: user agent

This post explains the pros and cons of using user agents when browsing the world wide web. What does it reveal and why?

Read more

Fireball Chinese malware and you

By now, you might have heard about an adware infection operation that has allegedly spread to 250 million systems called Fireball. The threat intelligence and research teams at Check Point wrote a blog post last week describing the operation, what the threat does the system and the alarming potential the malware has for doing some serious damage. We delve into the worst case scenario with this situation and how to remove Fireball if you are infected.

Read more

Rogue Google Chrome Extension Spies On You

A fake calculator extension monitors your web browsing.

Read more

A Brief Guide to FEATURE_BROWSER_EMULATION

FEATURE_BROWSER_EMULATION is a setting that controls which Internet Explorer version certain browser controls should mimic. Although popular with browser hijackers and other adware, it is not a risk by itself.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language