In today's threat landscape the lines between legitimate cyber-investigation tools and spying tools are becoming ever more blurred. In recent days, the discovery of two different threats has h
Day: July 27, 2012
Earlier in the week, I blogged about Android.Ackposts that is a malware used to harvest email accounts on compromised devices and in the blog I mentioned that malware targeting contact data on smar
Is a plastic drinking straw from McDonald’s the only thing keeping a thief, or worse a child, from accessing the loaded weapon in your closet safe? That’s apparently the case with one brand