ALL POSTS Fake DHS email – “Give us $350 in the next 24 hours” Christopher Boyd September 8, 2017 0 Comments Who likes threats? Nobody, as it turns out. That hasn’t stopped scammers from jumping on the menacing email train – next… Equifax breach: What you need to know [updated] Malwarebytes Labs September 8, 2017 0 Comments [updates 9/14/2017]Equifax has released information and confirmed the vulnerability (CVE-2017-5638) that was used in this breach after several days of intense… Google reminds website owners to move to HTTPS before October deadline Jovi Umawing September 7, 2017 0 Comments With the release of Chrome v62 in less than 3 months, Google will begin marking non-HTTPS pages with text input fields—like… Explained: False positives Pieter Arntz September 7, 2017 0 Comments What are false positives?False positive, which is sometimes written as f/p, is an expression commonly used in cybersecurity to denote that… Nigerian scams without the Nigerians William Tsing September 6, 2017 0 Comments Users in English speaking countries are quite familiar with the Nigerian scam: an important guy in Nigeria needs your help getting… Facebook worries: I didn’t post that Pieter Arntz September 6, 2017 0 Comments It is my assumption that most Facebook users don’t look at their own profile often. With your own profile, I mean… Expired domain names and malvertising Jérôme Segura September 5, 2017 0 Comments In Q1 and Q2 of 2017, we noticed a sharp decline in drive-by downloads coming from compromised websites. The campaigns of… A week in security (August 28 – September 3) Malwarebytes Labs September 4, 2017 0 Comments Last week, we looked at what actions Kronos can perform in the final installment of a 2-part post. We also dived… Insider threats in your work inbox Jovi Umawing September 1, 2017 0 Comments Recently, our friends at Barracuda found a new phishing campaign that banks on the popularity of cloud services used in most businesses, such as Microsoft Office 365.According to their… Previous 1 … 426 427 428 429 430 … 615 Next Contributors Threat Center Podcast Glossary Scams