ALL POSTS A state of constant uncertainty or uncertain constancy? Fast flux explained Jovi Umawing December 12, 2017 0 Comments Last August, WireX made headlines. For one thing, it was dubbed the first-known DDoS botnet that used the Android platform. For… How cryptocurrency mining works: Bitcoin vs. Monero Pieter Arntz December 11, 2017 0 Comments Ever wondered why websites that are mining in the background don’t mine for the immensely hot Bitcoin, but for Monero instead?… A week in security (December 04 – December 10) Malwarebytes Labs December 11, 2017 0 Comments Last week on the blog, we looked at a RIG EK malware campaign, explored how children are being tangled up in… Napoleon: a new version of Blind ransomware Malwarebytes Labs December 8, 2017 0 Comments The ransomware previously known as Blind has been spotted recently with a .napoleon extension and some additional changes. In this post,… Interesting disguise employed by new Mac malware HiddenLotus Thomas Reed December 8, 2017 0 Comments On November 30, Apple silently added a signature to the macOS XProtect anti-malware system for something called OSX.HiddenLotus.A. It was a… How we can stop the New Mafia’s digital footprint from spreading in 2018 Marcin Kleczynski December 7, 2017 0 Comments Cybercriminals are the New Mafia of today’s world. This new generation of hackers are like traditional Mafia organizations, not just in… Use TeamViewer? Fix this dangerous permissions bug with an update Malwarebytes Labs December 6, 2017 0 Comments TeamViewer, the remote control/web conference program used to share files and desktops, is suffering from a case of “patch it now.”… Internet of Things (IoT) security: what is and what should never be Wendy Zamora December 6, 2017 0 Comments The Internet has penetrated seemingly all technological advances today, resulting in Internet for ALL THE THINGS. What was once confined to… How to harden AdwCleaner’s web backend using PHP Jérôme Boursier December 6, 2017 0 Comments More and more applications are moving from desktop to the web, where they are particularly exposed to security risks. They are… Previous 1 … 417 418 419 420 421 … 617 Next Contributors Threat Center Podcast Glossary Scams