Security Blog

Chris Larsen's picture
Written by
Chris Larsen

One of the major trends in the malware space over the last year or so has been a big increase in the area we call "P.U.S.", or Potentially Unwanted Software. (Other companies substitute "Application", "Program", or "File" for "Software", to get a more polite acronym, but we like to call it like it is...)

Snorre Fagerland's picture
Written by
Snorre Fagerland

The Korean Gaming Industry Is Still Under Fire

 

Chris Larsen's picture
Written by
Chris Larsen

One of the benefits of travel (for me, at least) is an occasional chunk of research time in a hotel, where I can ignore e-mail for a few hours (because, hey, I'm on the road!) and dig into an interesting attack...

Maureen Oconnell's picture
Written by
Kevin Flynn

Malware authors are clever and persistent – more than 200,000 new malware samples are uncovered every day. And new malware attacks are often successful: 90% of companies reported a security breach in the last 24 months, according to a recent Ponemon Report. We see more data breaches than ever before, due to targeted attacks that sometimes go undetected for years.

Andrew Brandt's picture
Written by
Andrew Brandt

Last week, while on the road having meetings with some of our European partners and customers, I stumbled upon a very interesting infection: Cryptowall. The Trojan is a form of ransomware, similar to CryptoLocker in that it encrypts various document filetypes and then demands a financial payment for their safe return.