ALL POSTS File-in-the-middle hijackers Pieter Arntz August 23, 2016 0 Comments We are not sure if this is going to be a new trend among browser hijackers, but it seems more than… Systweak Redux: our response Christopher Boyd August 22, 2016 0 Comments On July 29, we published a blog titled “PUP Friday: Cleaning up with 5 star awards“, taking a look at a registry… PokemonGo Ransomware comes with some clever tricks Malwarebytes Labs August 22, 2016 0 Comments We have all seen the current popularity and craze with PokemonGo, it’s no surprise cyber-criminals would plan on using this to… A week in security (Aug 14 – Aug 20) Malwarebytes Labs August 22, 2016 0 Comments Last week, we published two blog posts about the Shakti Trojan: first, an overview of what it is (an information stealer… PUP Friday: MacKeeper Thomas Reed August 19, 2016 0 Comments MacKeeper first crossed my path more than five years ago. At that time, I was very active on Apple’s forums, and saw many… PCVARK plays dirty Thomas Reed August 19, 2016 0 Comments Recently, Jérôme Segura forwarded me a link to a fake virus scam page that seemed to be Mac-related. I began to… Shakti Trojan: Technical Analysis Malwarebytes Labs August 17, 2016 0 Comments Recently, we took a look at the interesting Trojan found by Bleeping Computer. Our small investigation on its background and possible… Parents, beware of this SMS scam Jovi Umawing August 17, 2016 0 Comments We’ve recently been alerted to a scam circulating within the UK and causing distress to parents or adults who knows someone… Soldiering on: the $5.6 million 419 scam Christopher Boyd August 16, 2016 0 Comments 419 scams most commonly drop into your mailbox, but they do occasionally appear via other channels such as snail mail and… Previous 1 … 467 468 469 470 471 … 617 Next Contributors Threat Center Podcast Glossary Scams