



DIY commercially-available ‘automatic Web site hacking as a service’ spotted in the wild
Reading Time: ~ 2 min.
Custom USB sticks bypassing Windows 7/8’s AutoRun protection measure going mainstream
Reading Time: ~ 2 min.

Rogue ads lead to the ‘Free Player’ Win32/Somoto Potentially Unwanted Application (PUA)
Reading Time: ~ < 1 min.



Yet another commercially available stealth Bitcoin/Litecoin mining tool spotted in the wild
Reading Time: ~ 2 min.

New Mac Malware Uses Right-to-Left Override To Trick Users
Reading Time: ~ 3 min.