ALL POSTS Selecting all PUPs Cecile Nguyen September 4, 2013 0 Comments Since revising our Malwarebytes Anti-Malware’s Potentially Unwanted Programs (PUP) detection to become more aggressive at rooting out annoying, misleading or harmful… The Murky Waters Of The Zero-Day Business Jérôme Segura September 2, 2013 0 Comments Finding software vulnerabilities is a full-time job for some people, but for another group, discovering a flaw in popular software can… Encryption: types of secure communication and storage Pieter Arntz September 1, 2013 0 Comments After supplying you with examples on how to encrypt your mail and how to encrypt files and folders I would like… Potential dangers for Google Glass, other wearable computers Jean Taggart August 30, 2013 0 Comments Wearable computing is a hot topic as of late.From smart watches like the rumored Samsung Galaxy Gear, to augmented reality, what was once… New York Times Hackers: ‘Gone Phishing’ Joshua Cannell August 29, 2013 0 Comments If you’ve been reading the news lately, you’ve probably noticed the New York Times (NYT) website was defaced just two days… Malware to Victims: “Because f*** you! That’s why.” Joshua Cannell August 29, 2013 0 Comments Rich Matteo, a researcher here at Malwarebytes, came across an interesting sample that erases files and leaves a not-so-friendly message to… End to Annoying Notification Bar Ads on Android? Armando Orozco August 28, 2013 0 Comments Seeing advertising in your Android app is something we’re used to and for the most part we tolerate.But there are some… Right on Cue, Hijackers Pose as NSA Adam Kujawa August 27, 2013 0 Comments I suppose we all saw this coming, ransomware authors are now posing as the NSA, claiming to be using the PRISM… Protect Yourself This Semester with Cybersecurity Tips from Malwarebytes Cecile Nguyen August 26, 2013 0 Comments What happens when you bring millions of 18- to 24-year-olds onto college and university campuses and have them connect to shared… Previous 1 … 597 598 599 600 601 … 618 Next Contributors Threat Center Podcast Glossary Scams