Phantom file formats

One of the many tricks employed by hackers in order to entice users into running malware voluntarily is to change the icon of a malicious…
View Post

Death Star

Regarding malware, on some occasions we have made graphic representations of it. This reminds me of a study carried out in PandaLabs that dealt with…
View Post