ALL POSTS Why you don’t need 27 different passwords Wendy Zamora May 4, 2017 0 Comments Passwords. The bane of modern existence. To celebrate this nuisance, the holiday gods have given us World Password Day, where thousands… OWASP top ten – Boring security that pays off William Tsing May 4, 2017 0 Comments There’s a lot of very unique, creative, and devastating cyber threats out there. The first inclination of a defender is to… Google Docs app spam goes phishing Christopher Boyd May 3, 2017 0 Comments There’s a very clever phishing scam going around at the moment – originally thought to be targeting journalists given the sheer… Adware the series, part 2 Pieter Arntz May 3, 2017 0 Comments In this post, we will be using the flowchart below to follow the process of determining which adware we are dealing with. Our… An Infosec Spring clean Christopher Boyd May 2, 2017 0 Comments We’re a month or so into Spring and it may well be time you had a spring clean – ha, ha,… Another OSX.Dok dropper found installing new backdoor Thomas Reed May 1, 2017 0 Comments On Friday a sophisticated Mac Trojan was discovered, called OSX.Dok, which installs malware designed to intercept all HTTP and HTTPS traffic. This… A week in security (Apr 24 – Apr 30) Malwarebytes Labs May 1, 2017 0 Comments Last week we gave some important tips on how to secure your privay on Android and we warned our readers about a new… New OSX.Dok malware intercepts web traffic Thomas Reed April 28, 2017 0 Comments Most Mac malware tends to be unsophisticated. Although it has some rather unpolished and awkward aspects, a new piece of Mac… System optimizers turning to tech support scams Pieter Arntz April 27, 2017 0 Comments A new trend, which was also pointed out in our Q1 cybercrime report, is the combination of PUPs and Tech Support… Previous 1 … 441 442 443 444 445 … 617 Next Contributors Threat Center Podcast Glossary Scams