



Awake at all hours during Cyber Security Awareness Month
Reading Time: ~ 3 min.
A look inside the SpyEye Trojan admin console
Reading Time: ~ 4 min.
Non-executable malicious files and code – Thre@t Reply
Reading Time: ~ < 1 min.
HTC acknowledges security flaw, plans update to fix
Reading Time: ~ 2 min.Mebromi: the first BIOS rootkit in the wild
Reading Time: ~ 6 min.
Morto Worm Annoyances Outstrip Functionality
Reading Time: ~ 6 min.
Trojans Employ Misdirection Instead of Obfuscation
Reading Time: ~ 5 min.
Black Hat Redux: Botnet Takedown Mistakes to Avoid
Reading Time: ~ 6 min.
Targeted Malware Infects Windows-based Cash Registers
Reading Time: ~ 4 min.
TDL3 and ZeroAccess: More of the Same?
Reading Time: ~ 5 min.