Thanks to Santiago Cortes for his assistance with this research.
Some samples exploiting the Adobe Flash Player CVE-2012-1535 Remote Code Execution Vulnerability through malicious Word docume
Category: iPhone 5
Beware of emails claiming that Apple has already announced the iPhone 5.
You could be infecting your Windows computer with malware.
iPhone 5 giveaways are flourishing on Facebook and elsewhere on the internet.
But how can you tell the scams from genuine offers? We help you decide, with some mathematics. Read More →