1644 posts
Beware of Valentine's Day Malware Distribution Campaigns, PandaLabs reports
Here are some examples of malware that used social engineering to infect users on this festive occasion PandaLabs offers tips to avoid computer viruses on…
Apps, apps, and more apps
Published by Ana Etxebarria It is clear that the number of applications for smartphones and tablets is almost infinite. There is pretty much an application…
Megaupload and the cybercrime fight
As most of you already now, yesterday Megaupload was closed by the FBI, accused of “copyright infringement”. You can read FBI’s press release here where…
2012 Security Trends
2011 is coming to an end, so now it’s time to try to see what we have to expect for the next 12 months: Social…
Could targeted attacks be avoided?
This could be a long blog post, but I’ll try to make it short. However, for those of you that are lazy, here you can…
Fake Cloud AV 2012
There is a new friend in the village. Many people thought that the fake antivirus (aka rogueware) business had decreased, and it was true that…
Hong Kong, AVAR 2011
Greetings from Hong Kong! This week we are enjoying the security conference AVAR, which is taking place in Hong Kong. Some interesting topics are being…