ALL POSTS How complex are the digital lives of teens? The NCSA takes a look. Jovi Umawing August 25, 2016 0 Comments The National Cyber Security Alliance (NSCA), a nonprofit organization that promotes the public awareness on cyber security, has released the results… How to secure your remote workers Wendy Zamora August 24, 2016 0 Comments Advances in networking and mobile technologies have enabled remote workforces on a global scale, whether that’s employing full-time staff members who… File-in-the-middle hijackers Pieter Arntz August 23, 2016 0 Comments We are not sure if this is going to be a new trend among browser hijackers, but it seems more than… Systweak Redux: our response Christopher Boyd August 22, 2016 0 Comments On July 29, we published a blog titled “PUP Friday: Cleaning up with 5 star awards“, taking a look at a registry… PokemonGo Ransomware comes with some clever tricks Malwarebytes Labs August 22, 2016 0 Comments We have all seen the current popularity and craze with PokemonGo, it’s no surprise cyber-criminals would plan on using this to… A week in security (Aug 14 – Aug 20) Malwarebytes Labs August 22, 2016 0 Comments Last week, we published two blog posts about the Shakti Trojan: first, an overview of what it is (an information stealer… PUP Friday: MacKeeper Thomas Reed August 19, 2016 0 Comments MacKeeper first crossed my path more than five years ago. At that time, I was very active on Apple’s forums, and saw many… PCVARK plays dirty Thomas Reed August 19, 2016 0 Comments Recently, Jérôme Segura forwarded me a link to a fake virus scam page that seemed to be Mac-related. I began to… Shakti Trojan: Technical Analysis Malwarebytes Labs August 17, 2016 0 Comments Recently, we took a look at the interesting Trojan found by Bleeping Computer. Our small investigation on its background and possible… Previous 1 … 467 468 469 470 471 … 618 Next Contributors Threat Center Podcast Glossary Scams