A new and currently unpatched flaw affecting Internet Explorer 10 (CVE-2014-0322) has been discovered on some highly targeted websites, indicating a…
Month: February 2014
Bitcoin Theft in the Underground
This week, news came out that Silk Road 2, the underground marketplace specializing in nefarious services, had all of its Bitcoins…
Using Good Code for Bad Things
It’s quite common for malware to take code from the Windows API and use it for a malicious purpose. For example,…
One-ring Phone Scams on the Rise
Have you recently had a call come through, that suspiciously only rang once, and had the urge to call back? If…
Five Digital Heartbreakers To Avoid This Valentine’s Day
Romance! Chocolates! Oversized novelty teddy bears! We won’t be covering any of those, but we will take a look at some…
Keeping your Steam Account Secure
It’s always a good idea to have browser Phish / Malware alert warnings enabled, because it can be the difference between seeing…
How to Unpack a Self-Injecting Citadel Trojan
The Citadel Trojan is nothing new, but I found one recently obtained from our collection systems and had a fun time…
Tech support scams: Show me the money
Fake or rogue tech support companies are lurking everywhere. Whether they cold-call you or deceive you with ads and pop-ups, you…
Flappy Bird Downloads Lead To Surveys
Poor old Flappy Bird, YOU WERE GONE TOO SOON. However, he’s back! Sort of. Actually, he isn’t back at all because…
Ad2Store redirections: the latest annoyance for mobile users
Online ads can be very aggressive and disruptive, not to mention they often carry malicious payloads aka malvertising. You may have come…