ALL POSTS A week in security (Mar 6th – Mar 12th) Malwarebytes Labs March 14, 2017 0 Comments Last week, we had a bumper crop of blog posts for you to get your teeth into, including our Cybercrime Tactics… Adware vs. ad fraud Pieter Arntz March 13, 2017 0 Comments Adware and ad fraud are in the same business and both don’t care very much how they make money, as long… Explained: Spora ransomware Malwarebytes Labs March 10, 2017 0 Comments Nowadays, ransomware has become the most popular type of malware. Most of the new families are prepared by amateurs (script-kiddies) and… CryptoBlock ransomware and its C2 Malwarebytes Labs March 10, 2017 0 Comments CryptoBlock is an interesting ransomware to keep an eye on. We expect this to be a ransomware that is in development… Torify and analyze traffic for your VM Jérôme Boursier March 9, 2017 0 Comments Virtual machines are a great tool to run untrusted piece of software and analyzing the network activity. Most of the time,… Exploit kits: Winter 2017 review Jérôme Segura March 9, 2017 0 Comments Mac security facts and fallacies Thomas Reed March 8, 2017 0 Comments There are many Mac security myths circulating among users. So how can you tell if the advice you’re reading is fact… “Federal Ministry of Agriculture” 419 spam Christopher Boyd March 8, 2017 0 Comments This is just a short heads up to advise you to ignore the below missive, which is currently landing in mailboxes… A multi-purpose fake online scanner Pieter Arntz March 7, 2017 0 Comments Just to show you that behind some PUPs there are threat actors that are too lazy to be bothered, we offer… Previous 1 … 447 448 449 450 451 … 617 Next Contributors Threat Center Podcast Glossary Scams