ALL POSTS Explained: What is big data? Pieter Arntz August 3, 2018 0 Comments If the pile of manure is big enough, you will find a gold coin in it eventually. This saying is used… Social engineering attacks: What makes you susceptible? Jovi Umawing August 2, 2018 0 Comments We now live in a world where holding the door open for someone balancing a tray of steaming hot coffee—she can’t… What’s in the spam mailbox this week? Christopher Boyd July 31, 2018 0 Comments We’ve seen a fair few spam emails in circulation this week, ranging from phishing to money muling to sexploitation. Shall we… A week in security (July 23 – July 29) Malwarebytes Labs July 30, 2018 0 Comments Last week on Labs, we looked at an adware called MobiDash getting stealthy, a new strain of Mac malware called Proton that was found… New Android P includes several security improvements Gleb Malygin July 27, 2018 0 Comments According to the Android developer Program Overview, the next major version of Android, Android 9.0 or P, is set to arrive soon…. Introducing: Malwarebytes Browser Extension Malwarebytes Labs July 26, 2018 0 Comments [Update 9/20/2019] The browser extensions are out of beta. You can read about the final product Malwarebytes Browser Guard in this… ‘Hidden Bee’ miner delivered via improved drive-by download toolkit Malwarebytes Labs July 26, 2018 0 Comments This blog post was authored by @hasherezade and Jérôme Segura.We recently detected a drive-by download attack trying to exploit CVE-2018-4878, a vulnerability in Flash… Trojans: What’s the real deal? Christopher Boyd July 25, 2018 0 Comments The fictional Greeks hiding in their legendary Trojan horse would probably be excited to learn that the default Wiki page for… New strain of Mac malware Proton found after two years Thomas Reed July 24, 2018 0 Comments Last week, Kaspersky reported on a new variant of the Mac malware Proton, which they have dubbed Calisto, that has been… Previous 1 … 394 395 396 397 398 … 618 Next Contributors Threat Center Podcast Glossary Scams