Curious how much you spend on Amazon?
Check out Usko, the latest product from the Redact team.
Curious how much you spend on Amazon? Get shopping analytics while maintaining your privacy from Usko, the latest product from the Redact team.
Check out Usko

Our cat diaries

Keep up with what we're working on.

You Should Delete these Apps if you Have Them2022-08-15

Despite Google’s best efforts, there are a number of infected Android apps on the Play Store. In fact, there’s a list of around 28 that have over 10 million downloads between them.

Read more...

Tor is Helping Russians Find the Truth2022-08-11

Tor, The Onion Router, has been around for years and has helped millions of people surf in privacy while frustrating attempts to censor and track traffic.

Read more...

Online Store PrestaShop Exploited to Steal Payment Data2022-08-10

The online shopping platform known as PrestaShop has been the victim of malicious code that has the ability to steal secure payment information from its merchants.

Read more...

How to Protect an Android Device from Malware2022-08-08

We’ve talked a lot about how to prevent yourself and protect yourself from Malware on a computer, but not a lot about phones. As we’re interested in giving everyone as much knowledge as possible to protect themselves, it makes sense to show both sides of the story.

Read more...

A Quick Note about our Error Logging2022-08-06

We had a misconfiguration in our access logging system, but it is fixed now.

Read more...

New LofyLife Malware Targets Discord Users2022-08-05

Discord users are being targeted once again by malware. This time the malware can steal Discord tokens and personal data.

Read more...

Mi5 and FBI Issue Joint Warning over Chinese IP Theft2022-08-03

The British MI5 and our own FBI have issued an unprecedented warning over the threat China and the Chinese State poses to businesses.

Read more...

Malware as a Service, for Less than the Cost of a Beer2022-08-02

Malware as a service isn’t anything new. We have known you could either hire hackers to perform specific malware attacks, or hire platforms per hour or per attack to cause havoc.

Read more...