



Malicious Web-based Java applet generating tool spotted in the wild
Reading Time: ~ 2 min.
Webroot returns from Automation Nation 2014
Reading Time: ~ 2 min.

A peek inside a newly launched all-in-one E-shop for cybercrime-friendly services
Reading Time: ~ 2 min.
Malicious JJ Black Consultancy ‘Computer Support Services’ themed emails lead to malware
Reading Time: ~ 2 min.
Spamvertised ‘Notification of payment received’ themed emails lead to malware
Reading Time: ~ < 1 min.

Spamvertised ‘Error in calculation of your tax’ themed emails lead to malware
Reading Time: ~ 2 min.
Malicious DIY Java applet distribution platforms going mainstream – part two
Reading Time: ~ 3 min.
Android.Koler – Android based ransomware
Reading Time: ~ 2 min.