25 Years and our computers are still…

From Ghostball to the nVir virus to Reveton and CryptoLocker, here’s a look back at the last 25 years in cyber security.

Read more

Memory scan

Why do anti-viruses and Malwarebytes Anti-Malware scan your computer’s memory?

Read more

Android Botnets Hop on the TOR Train

Cyber criminals can infiltrate your mobile devices with the just discovered first “TOR Trojan for Android”.

Read more

The RTLO method

RTLO can be used to spoof fake extensions. Learn how malware writers are using this old trick to spread malware.

Read more

Select your language