Fireball: Adware with potential nuclear consequences
Advertising can sometimes be annoying — and sometimes it can be malicious.…
Attacks on enterprise security: Microsoft services as a weapon
Hackers have gone big with the exploitation of legitimate software. Several reports…
Mobile malware Faketoken impersonates taxi apps
You’re in a hurry, trying to get to work, a business meeting,…
Malware exploits WAP subscriptions to steal money
Do you remember what WAP is? Didn’t think so! WAP is a…
Not-a-Virus: What is it?
Sometimes, Kaspersky Internet Security pops up a window with a yellow frame…
Android for cars: Secure connection?
In the movie Dude, Where’s My Car? (2000), viewers follow the humorous…
Three ways to rob an ATM: Remote, almost remote, and physical
You might’ve noticed that we are fond of theft by ATM. No,…
How to properly update Windows to protect your computer from WannaCry
By now, everyone has heard about the WannaCry ransomware attack. So far…
WannaCry ransomware: how it attacks and how to protect your business
Earlier today, we teamed up with Comae Technologies to present an emergency…