ALL POSTS How to create a successful cybersecurity policy Wendy Zamora March 16, 2016 0 Comments Along the edge of subway tracks in the UK is a sign that says, “Mind the gap,” warning passengers to watch… An iCloud scam that may be worse than ransomware Thomas Reed March 16, 2016 0 Comments Ransomware – malicious software that encrypts your files and then demands payment to unlock them – has become a major scourge… A Look Into Malvertising Attacks Targeting The UK Jérôme Segura March 16, 2016 0 Comments We recently stumbled upon a malvertising incident on a large British newspaper site which we decided to investigate in greater details.As… Minecraft, Modding and You Christopher Boyd March 15, 2016 0 Comments Have your children lost entire jam sandwiches down the back of the sofa? Is your cat sick of water pistols? Do… Large Angler Malvertising Campaign Hits Top Publishers Malwarebytes Labs March 15, 2016 0 Comments During the past few weeks, malvertising activity was a little bit on the decline, at least within our own telemetry. We… Will Hand Over Millions for Your Info: A 419 Scam Jovi Umawing March 14, 2016 0 Comments “Maria” (not her real name), a friend of mine based in the Philippines, received an SMS recently, that said: I have… A Week in Security (Mar 06 – Mar 12) Malwarebytes Labs March 14, 2016 0 Comments Last week, our resident Mac expert Thomas Reed commented on KeRanger, the first ransomware targeting the OSX platform. We also found… Windows AppLocker: An Introduction Pieter Arntz March 11, 2016 0 Comments Windows AppLocker is a feature that was introduced in Windows 7 and Windows Server 2008 R2 as a means to limit… How to beat ransomware: prevent, don’t react Wendy Zamora March 11, 2016 0 Comments Picture this: You’ve spent the last few weeks working on a tribute video for a friend’s 30th wedding anniversary. You collected… Previous 1 … 487 488 489 490 491 … 618 Next Contributors Threat Center Podcast Glossary Scams