ALL POSTS CryptoBlock ransomware and its C2 Malwarebytes Labs March 10, 2017 0 Comments CryptoBlock is an interesting ransomware to keep an eye on. We expect this to be a ransomware that is in development… Torify and analyze traffic for your VM Jérôme Boursier March 9, 2017 0 Comments Virtual machines are a great tool to run untrusted piece of software and analyzing the network activity. Most of the time,… Exploit kits: Winter 2017 review Jérôme Segura March 9, 2017 0 Comments Mac security facts and fallacies Thomas Reed March 8, 2017 0 Comments There are many Mac security myths circulating among users. So how can you tell if the advice you’re reading is fact… “Federal Ministry of Agriculture” 419 spam Christopher Boyd March 8, 2017 0 Comments This is just a short heads up to advise you to ignore the below missive, which is currently landing in mailboxes… A multi-purpose fake online scanner Pieter Arntz March 7, 2017 0 Comments Just to show you that behind some PUPs there are threat actors that are too lazy to be bothered, we offer… Mobile Menace Monday: Facebook Lite infected with Spy FakePlay Nathan Collier March 6, 2017 0 Comments A version of the popular mobile app Facebook has been found to be infected with what we detect as Android/Trojan.Spy.FakePlay. Facebook… Malwarebytes Labs Presents: The Cybercrime Tactics and Techniques Report Malwarebytes Labs March 6, 2017 0 Comments Last year was interesting for malware distribution and development. While we still experienced a flood of ransomware and immense distribution of… Free antivirus coupon leads to tech support scam Jérôme Segura March 3, 2017 0 Comments In a previous blog post, we showed how users were redirected to a tech support scam page via a rogue Google… Previous 1 … 447 448 449 450 451 … 617 Next Contributors Threat Center Podcast Glossary Scams