How is Malware Researched?
You may wonder what goes on behind the scenes between the time when researchers get malware samples and the...
You may wonder what goes on behind the scenes between the time when researchers get malware samples and the...
It’s been reported that one AV product is detecting a product on the App Store as Trojan.JS.iframe.BKD. To the...
A new targeted attack against Uyghur Mac users has been hitting the news. The threat is similar to OSX/CallMe.A we...
The best myths are those that contain a whisper of truth. Likewise, the theory that everyone can prevent malware...
Until just a few minutes ago, Softonic, a software download site, was delivering adware that would be installed regardless...
There has been a lot of discussion, since the initial Flashback variants were released in late 2011, about Flashback’s...
The tricky thing about antivirus software is that it seems like a fairly mysterious piece of software. How does...
There are plenty of myths about malware in general, but Macs especially seem to attract an extra dose of...
A group of researchers has recently found that it’s possible to create a mobileconfig file that will create a...
Every now and again, we’ll see new variants of popular malware families, especially when those malware families are commonly...