ALL POSTS Malicious cryptomining and the blacklist conundrum Jérôme Segura March 26, 2018 0 Comments When Coinhive first came out in September of 2017, it was fairly easy to identify websites using browser miners by looking… A week in security (March 19 – March 25) Malwarebytes Labs March 26, 2018 0 Comments Last week, we looked at the growing problem of smartphone addiction, how link rot is continually slicing down portions of the… “Celebrating Stephen Hawking” with a 419 scam Christopher Boyd March 23, 2018 0 Comments The recently departed Stephen Hawking is apparently back from the dead, now a target for scammers wanting to extract some quick… DDoS attacks are growing: What can businesses do? Pieter Arntz March 22, 2018 0 Comments Depending on the type and size of your organization, a DDoS (Distributed Denial of Service) attack can be anything from a… CyberByte steals Malwarebytes’ intellectual property Thomas Reed March 21, 2018 0 Comments At Malwarebytes, we frequently examine apps for detection as Potentially Unwanted Programs (PUPs). These are programs that exhibit a wide variety… The digital entropy of death: link rot Christopher Boyd March 20, 2018 0 Comments Hot on the heels of a grim blog about digital death comes…another blog about digital death. Except in this case, the… Investors concerned about smartphone addiction; Apple responds with new webpage Jovi Umawing March 19, 2018 0 Comments Hot on the heels of an open letter from investors urging Apple to do more to protect children from smartphone addiction, the… A week in security (March 12 – March 18) Malwarebytes Labs March 19, 2018 0 Comments Last week on Malwarebytes Labs, we took a look at the inner workings of a fileless attack, explored what happened in… A cure for the common cold call: freeze them out Pieter Arntz March 16, 2018 0 Comments The phone rings and it’s a number I don’t recognize. That’s enough to bring my mood down a few degrees. It… Previous 1 … 407 408 409 410 411 … 617 Next Contributors Threat Center Podcast Glossary Scams