- Security
- By Ionut Ilascu
- August 27th, 2014
Malware Pieces Use Several Techniques to Avoid Investigative Efforts
Malware authors try to send researchers on the wrong track
- Security Blog
- By Ionut Ilascu
- August 21st, 2014
Malvertising Is Strong On YouTube
Security researcher to do live capture of malware YouTube website
- Security
- By Eduard Kovacs
- September 27th, 2012
DDOS Attacks Take the Day Off During Holidays, Study Shows
The number of cyberattacks recorded a considerable drop on Earth Day
- Software Blog
- By Ionut Ilascu
- January 13th, 2012
Agnitum Gets 10th Consecutive VB100 Award
Outpost Security Suite Pro recorded no false positives
- Security
- By Eduard Kovacs
- October 11th, 2011
A Rogue Web Browser Buried in 2006 Resurfaces
It promises the world, but it only delivers malware
- Virus alerts
- By Eduard Kovacs
- October 8th, 2011
Virus Bulletin News Tweets Hide Malware Attacks
Twitter posts are among the latest methods utilized to spread malware
- Security
- By Eduard Kovacs
- October 7th, 2011
Reputation Systems Become Inefficient in Front of Cybercriminals
Clean IP addresses are becoming hard to find because of hackers