ALL POSTS Windows AppLocker: An Introduction Pieter Arntz March 11, 2016 0 Comments Windows AppLocker is a feature that was introduced in Windows 7 and Windows Server 2008 R2 as a means to limit… How to beat ransomware: prevent, don’t react Wendy Zamora March 11, 2016 0 Comments Picture this: You’ve spent the last few weeks working on a tribute video for a friend’s 30th wedding anniversary. You collected… Cerber ransomware: new, but mature hasherezade March 11, 2016 0 Comments Ransomware authors seem to love mythological creatures. We have seen Chimera, now we will take a look at Cerber. Both are… The Bank of “We Have No Idea What We’re Doing” Christopher Boyd March 7, 2016 0 Comments One can only assume the creators of this 419 scam attempt threw up their hands, cried YOLO and set about putting… First Mac ransomware spotted Thomas Reed March 7, 2016 0 Comments Apple quietly added detection of something called “KeRanger” to the XProtect anti-malware definitions in OS X on Saturday.It was revealed on… A Week in Security (Feb 28 – Mar 05) Malwarebytes Labs March 7, 2016 0 Comments Last week, we touched on a Facebook video spam, a fake Google Docs phishing site, and a technical yet comprehensive (at… Google Docs? Check One More Time… Christopher Boyd March 4, 2016 0 Comments If you go looking for Google Docs related URLs on your travels, you may run into the following site (registered through… Adware Dotdo FastInternet blocks security-related domains Pieter Arntz March 4, 2016 0 Comments Author’s Note: We at Malwarebytes continue to do our part in educating our product users and constant blog readers about day-to-day… Operation Fingerprint: A Look Into Several Angler Exploit Kit Malvertising Campaigns Jérôme Segura March 1, 2016 0 Comments Malicious advertising, also known as malvertising, has become the best method to distribute malware on a global scale with surgical precision. Simply… Previous 1 … 488 489 490 491 492 … 618 Next Contributors Threat Center Podcast Glossary Scams