ALL POSTS Drive-by download campaign targets Chinese websites, experiments with exploits Jérôme Segura February 22, 2018 0 Comments During our web crawls we sometimes come across bizarre findings or patterns we haven’t seen before. This was the case with… How to build an incident response program: GDPR guidelines Paul Kincaid February 21, 2018 0 Comments In today’s computing world, it is not a matter of “if” an organization will get compromised, but “when.” That’s why, in… Encryption 101: a malware analyst’s primer Vasilios Hioureas February 20, 2018 0 Comments While most in the security industry know what encryption is, many lack a basic understanding of how it is used in malware—especially ransomware…. A week in security (February 12 – February 18) Malwarebytes Labs February 19, 2018 0 Comments Last week on Malwarebytes Labs, we looked at a huge Android cryptomining campaign, malicious apps on Google Play, and some Apple… Physician, protect thyself: cybercriminals target healthcare data Jovi Umawing February 15, 2018 0 Comments No one knows you better than you do. But thanks to technology advances and the continued digitization of healthcare data accumulation… Online security tips for Valentine’s Day: how to beat the cheats Christopher Boyd February 14, 2018 0 Comments Valentine’s Day is upon us once more, and so are lots of dating-friendly security tips. Read on and secure your profile,… Panic attack: Apple scams apply pressure Christopher Boyd February 13, 2018 0 Comments We’ve seen a number of Apple-related phishes in circulation over the last few days. While most of them already lead to… Kotlin-based malicious apps penetrate Google market Gleb Malygin February 13, 2018 0 Comments An open-source programming language, Kotlin is a fully-supported official programming language for Android. Google boasts that Kotlin contains safety features in… Drive-by cryptomining campaign targets millions of Android users Jérôme Segura February 12, 2018 0 Comments Malvertising and online fraud through forced redirects and Trojanized apps—to cite the two most common examples—are increasingly plaguing Android users. In many… Previous 1 … 411 412 413 414 415 … 618 Next Contributors Threat Center Podcast Glossary Scams