
Pirate Matryoshka: A nesting doll Trojan from Pirate Bay
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
136 articles
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
Can an ATM turn into a slot machine? WinPot malware helps its owners win big at the “ATM game.”
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Freelancers are beloved targets for cybercriminals, who use phishing and malware to steal credentials and money. Here’s how to avoid their traps and stay safe.
Let’s talk about mobile malware that can empty your bank account or spy on you.
Almost half of the most-visited websites open visitors to potential dangers. What can you do?
KeyPass ransomware is infecting computers worldwide, encrypting almost everything in its path. And it all starts with downloading a seemingly innocuous installer.
In this edition of the podcast, Jeff and Dave discuss the Black Hat USA conference, a downside of Fortnite coming to Android, the Reddit hack, and our latest report on the state of malware.
In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.
The recently leaked source code actually isn’t Carbanak — it’s another advanced financial malware family. And the leak will likely have a huge ripple effect.
In part one of our mobile malware series, we cover infectious Android malware — adware, subscribers, and flooders — and how mobile viruses can damage your smartphone or tablet…
Did you see that new fully loaded Android smartphone, the one that looks too good for the price? Well, it may include some unwanted extras.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Our experts analyzed last year’s financial cyberthreats, and here is their report
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Advertising can sometimes be annoying — and sometimes it can be malicious. Businesses that make their money selling advertisements sometimes go too far trying to make sure you see their ads. Recently researchers found that one such business — a big digital-marketing agency — went as far as installing adware on 250 million computers running Windows and macOS all over the world.
Everyone, this is not a drill. It applies to all versions of Android, and at the time of this post’s publication, Google has not yet patched the vulnerability. By using this vulnerability, malicious actors can steal data including passwords; install applications with a full set of permissions; and monitor what the user is interacting with or typing on a keyboard on any Android smartphone or tablet. We repeat: This is not a drill…