ALL POSTS Torify and analyze traffic for your VM Jérôme Boursier March 9, 2017 0 Comments Virtual machines are a great tool to run untrusted piece of software and analyzing the network activity. Most of the time,… Exploit kits: Winter 2017 review Jérôme Segura March 9, 2017 0 Comments Mac security facts and fallacies Thomas Reed March 8, 2017 0 Comments There are many Mac security myths circulating among users. So how can you tell if the advice you’re reading is fact… “Federal Ministry of Agriculture” 419 spam Christopher Boyd March 8, 2017 0 Comments This is just a short heads up to advise you to ignore the below missive, which is currently landing in mailboxes… A multi-purpose fake online scanner Pieter Arntz March 7, 2017 0 Comments Just to show you that behind some PUPs there are threat actors that are too lazy to be bothered, we offer… Mobile Menace Monday: Facebook Lite infected with Spy FakePlay Nathan Collier March 6, 2017 0 Comments A version of the popular mobile app Facebook has been found to be infected with what we detect as Android/Trojan.Spy.FakePlay. Facebook… Malwarebytes Labs Presents: The Cybercrime Tactics and Techniques Report Malwarebytes Labs March 6, 2017 0 Comments Last year was interesting for malware distribution and development. While we still experienced a flood of ransomware and immense distribution of… Free antivirus coupon leads to tech support scam Jérôme Segura March 3, 2017 0 Comments In a previous blog post, we showed how users were redirected to a tech support scam page via a rogue Google… Coachella-gate: fire in the disco Christopher Boyd March 2, 2017 0 Comments I’d like to make some smart references to the Coachella event, except that I’ve only heard of about six of the… Previous 1 … 448 449 450 451 452 … 618 Next Contributors Threat Center Podcast Glossary Scams