Author’s Note: We at Malwarebytes continue to do our part in educating our product users and constant blog readers about day-to-day…
Year: 2016
Some of you may remember the golden age of rogue antivirus software (AKA FakeAV) circa 2008. These programs that were often pushed…
On March 27, the COMELEC (Philippines’ Commission on Elections) website was defaced and data on up to 55 million registered voters…
Compromised websites remain one of the surefire ways to redirect innocent visitors to exploit kits. During the past few days we’ve started…
Last week, we talked about persistent tech support scammers, a BMW 419 scam, uncovered a malvertising campaign on a popular photo…
Update (04/19): AdsTerra reached out on Twitter but we are still waiting for a point of contact to send information. AdsTerra…
In the beginning of the year, we asked our readers for their input about our PUP Friday initiative. For those of…
Victims of the Petya ransomware will be pleased to learn that there is a method to recover your files without having…
It’s pretty simple to understand where a file goes when you save it on your PC. It lives on your hard…
The trade in stolen nude celebrity shots may have died down somewhat since The Fappening was once a-happening, but that doesn’t mean…