ALL POSTS Tips for safe summer travels: your cybersecurity checklist Pieter Arntz June 8, 2018 0 Comments Summer is just around the corner in the Northern Hemisphere, and with it comes vacation plans for many. Those looking to… Malware analysis: decoding Emotet, part 2 Vishal Thakur June 7, 2018 0 Comments In part two of our series on decoding Emotet, (you can catch up on part 1 here), we’ll cover analysis of… PSA: Users with landlines are more vulnerable to scams Jean Taggart June 6, 2018 0 Comments It’s time to have “the talk” with your parents, relatives, and loved ones. Anyone still using a landline must be warned:… Social media: A treasure trove of spam and scams Pieter Arntz June 5, 2018 0 Comments There are two kinds of spam associated with social media. There are spam ads that actually live on social media, and… Mobile Menace Monday: A race to hidden ads Nathan Collier June 4, 2018 0 Comments Who doesn’t love a good motorcycle racing game, right? How about one easily available on Google Play, a “safe” place for… A week in security (May 28 – June 3) Malwarebytes Labs June 4, 2018 0 Comments Last week on Labs, we talked about the significance of SEO poisoning in the world of search marketing, blackmail attempts against… Blocks for Flash and others coming to Office 365 Christopher Boyd June 1, 2018 0 Comments If you’re a user of Microsoft Office products such as Word and Excel, you’re probably aware that they’ve been used as… Instagram story spam claims free Apple Watch Christopher Boyd May 31, 2018 0 Comments I have to admit, I’m not 100 percent sure who Elton Castee is. “Who’s that?” you ask? Digging around revealed that… A conversation with America Geeks William Tsing May 31, 2018 0 Comments Thanks to NeeP for contributing significant research. You can check out NeeP’s YouTube channel here.Malwarebytes has written quite a bit about… Previous 1 … 398 399 400 401 402 … 617 Next Contributors Threat Center Podcast Glossary Scams