ALL POSTS Exploit kits: Winter 2018 review Jérôme Segura March 29, 2018 0 Comments In the past, we used to do a blog series on exploit kits where we would periodically check in on the… An in-depth malware analysis of QuantLoader Malwarebytes Labs March 28, 2018 0 Comments This guest post is written by Vishal Thakur, CSIRT/Salesforce. For more on Vishal, read his bio at the end of the… 10 ways to protect your Android phone Jovi Umawing March 28, 2018 0 Comments Android has been around for nearly a decade and has come a long way from its early wannabe iPhone days. New features,… Encryption 101: Decryptor’s thought process Vasilios Hioureas March 27, 2018 0 Comments In the previous parts 1, 2 and 3 of this series, we covered the basics of encryption, walked through a live… What Facebook’s Cambridge Analytica problem means for your data Christopher Boyd March 26, 2018 0 Comments As you may already know, there’s been a security meltdown at Facebook, thanks to a company called Cambridge Analytica and Donald… Malicious cryptomining and the blacklist conundrum Jérôme Segura March 26, 2018 0 Comments When Coinhive first came out in September of 2017, it was fairly easy to identify websites using browser miners by looking… A week in security (March 19 – March 25) Malwarebytes Labs March 26, 2018 0 Comments Last week, we looked at the growing problem of smartphone addiction, how link rot is continually slicing down portions of the… “Celebrating Stephen Hawking” with a 419 scam Christopher Boyd March 23, 2018 0 Comments The recently departed Stephen Hawking is apparently back from the dead, now a target for scammers wanting to extract some quick… DDoS attacks are growing: What can businesses do? Pieter Arntz March 22, 2018 0 Comments Depending on the type and size of your organization, a DDoS (Distributed Denial of Service) attack can be anything from a… Previous 1 … 407 408 409 410 411 … 618 Next Contributors Threat Center Podcast Glossary Scams