Acer, well known manufacturer of laptops, TVs, and other goods, has announced a long-running breach (active for nearly a year), targeting…
Month: June 2016
Last week, we uncovered a truth about malvertising, briefed our readers on email spoofing, disclosed advanced phishing tactics used by PayPal…
For those tracking exploit kits, the disappearance of the Angler exploit kit last week was a major event. While a lot of…
Email spoofing basically comes down to sending emails with a false sender address. This can be used in various ways by…
A variant of Android/Trojan.FakeApp is stealing the identities of popular applications (apps) such as TrueCaller and Torque Pro. As soon as…
Ransomware has become the new norm for cyber-criminals. Every week there are fresh ransomware threats with new functionalities and improvements. zCrypt ransomware…
Phishers are back to using an old tactic in a new fashion to get hold of their victims’ credentials. One of…
Update 6.15.16: An earlier version of this article mentioned a specific adblocking product. Its inclusion was intended to be illustrative only,…
Hey folks, Welcome to the new Malwarebytes Unpacked…err…Labs! It’s new, improved, and bigger than ever. Hope you like it. So why…
Update (06/13/2016): Still no sign of Angler EK activity since late June 6th PST. In the meantime, the actor known as ihateclowns/SadClowns…