July 27, 2012

readings: 504



The Malware That I Used To Know

Malware, much like all weapons, evolve based upon multiple factors, be it the protections of their intended target, the weapon operator and their organization or the general intent that it was created for.  Unlike most weapons though, malware evolved with a pattern closer to that of a biological disease.  Early variants were created and most […]

Continue reading..

March 20, 2012

readings: 237



RSA 2012 Conference in Review

In the beginning months of every year, the people fighting the good fight against internet crime converge upon the Moscone Center In San Francisco.  The RSA Conference is an event that brings huge amounts people from around the world together, over 200 sessions, 450 speakers and 350 security-focused exhibitors,  for a week to focus on […]

Continue reading..

July 28, 2011

readings: 787



Where Does Your Malware Come From? [Infographic]

Where does your malware come from? How does it get to your computer? It is not like there is some magical, malicious stork that comes and drops off some demented baby into your operating system that makes it join a botnet at knife point. There is no stork, there is no baby. Blue Coat security […]

Continue reading..

June 30, 2011

readings: 502



Mariposa Botnet is alive (?)

‘Butterfly bot’ kit steals financial information, but its licensing model could ultimately lead authorities to its newest botmasters. A financial-fraud botnet built with the same malware kit used in the now-defunct Mariposa botnet remains active after arrests this month of two Eastern European men who allegedly ran it. Researchers at Unveillance, Panda Labs, and Damballa […]

Continue reading..

April 19, 2011

readings: 6,233



Best Antivirus for Windows 7 – AV-Test 2011/Q1

AV-Test, one of the most influential independent labs for testing, certification and comparative analysis of IT security products, as usual, has issued its first report of the year, certifying 17 out of 22 of the Best Antivirus products for Windows 7 in 2011. AV-Test certifies Antivirus or Security Suites that achieve a cumulative score at […]

Continue reading..

March 29, 2011

readings: 854



MrxCls – Malicious driver and primary attack of Stuxnet

There has been much attention placed on Stuxnet by the world media since it was widely reported in the summer of 2010.  As we have seen the evolution of malware from mere annoyance, to organized crime over the years, Stuxnet marks the first known targeted malware attack designed to damage physical property, capable of destroying buildings, […]

Continue reading..

March 5, 2011

readings: 663



Carberp: Silent trojan, eventual successor to ZeuS

Today the vast majority of consumer banking and bill payment is done online.  Due to the fact that online transactions are growing in volume, malware authors are  increasingly focused on developing malicious software designed to steal personal data from infected PCs. A online black market exists where different crimeware packages (Kits for the creation of […]

Continue reading..

Random Articles

June 20, 2010

readings: 460



What is Phishing?

Phishing is a scam where internet fraudsters send spam or pop-up messages to lure personal and financial information from unsuspecting victims.

Continue reading..

June 22, 2010

readings: 25,439



What is Spyware?

Spyware are small programs that are installed on our system in order to steal our data and spy our movements through the network.

Continue reading..


June 22, 2010

readings: 371



What is spam?

Every Internet user knows the word ‘spam’ and sees it in their inbox quite often. But not everyone knows that years ago the word ‘spam’ had nothing to do with either the Internet or emails.

Continue reading..

June 20, 2010

readings: 334



What is Adware?

Adware “Advertising-Supported”, in other words, these programs are created to show advertising.

Continue reading..


See more articles in the archive

Latest news (in Spanish)

 
Follow us on Twitter Subscribe to our news Follow us on Facebook