Office DDE attack works in Outlook too – here’s what to do
DDE attacks can be run from within Outlook emails and calendar invites Continue reading Office DDE attack works in Outlook too – here’s what to do
Collaborate Disseminate
DDE attacks can be run from within Outlook emails and calendar invites Continue reading Office DDE attack works in Outlook too – here’s what to do
The Péter Szőr award recognises the best piece of technical security research published each year Continue reading SophosLabs’ Gabor Szappanos awarded for AKBuilder research
DirtyCOW can be used to compromise phones and tablets Continue reading Android malware ZNIU exploits DirtyCOW vulnerability
This BitPaymer malware variant uses tricks that you don’t usually see in ransomware – but it still scrambles your files in the end. Continue reading How BitPaymer ransomware covers its tracks
When you’re installing an Android app, pause before you approve one that asks for a lot of permissions – do you really need that app on your device? Continue reading How shared Android libraries could be weaponized for data theft
Google has done a good job of removing infected apps from the Play store, but victims are being hit from other sources Continue reading Thousands of Android-spying apps in the wild: what to do about SonicSpy
Emotet arrives as a malicious email attachment and tries to steal your online banking credentials Continue reading Watch out for Emotet, the trojan that’s nearly a worm
Once installed it tries to steal banking and credit card details Continue reading Android users: beware ‘Invisible Man’ malware disguised as Flash
We’ve found two apps in Google Play that use plugins to help themselves to your text messages Continue reading Don’t want your SMSs stolen? Don’t download these Android apps
At $400, the Philadelphia ransomware kit isn’t cheap – but crooks buying it will get a lot of bang for their buck, as we’ve discovered from digging in to how it works Continue reading Philadelphia RaaS: our map of how it works (and how to prevent it)