ALL POSTS Encryption: types of secure communication and storage Pieter Arntz September 1, 2013 0 Comments After supplying you with examples on how to encrypt your mail and how to encrypt files and folders I would like… Potential dangers for Google Glass, other wearable computers Jean Taggart August 30, 2013 0 Comments Wearable computing is a hot topic as of late.From smart watches like the rumored Samsung Galaxy Gear, to augmented reality, what was once… New York Times Hackers: ‘Gone Phishing’ Joshua Cannell August 29, 2013 0 Comments If you’ve been reading the news lately, you’ve probably noticed the New York Times (NYT) website was defaced just two days… Malware to Victims: “Because f*** you! That’s why.” Joshua Cannell August 29, 2013 0 Comments Rich Matteo, a researcher here at Malwarebytes, came across an interesting sample that erases files and leaves a not-so-friendly message to… End to Annoying Notification Bar Ads on Android? Armando Orozco August 28, 2013 0 Comments Seeing advertising in your Android app is something we’re used to and for the most part we tolerate.But there are some… Right on Cue, Hijackers Pose as NSA Adam Kujawa August 27, 2013 0 Comments I suppose we all saw this coming, ransomware authors are now posing as the NSA, claiming to be using the PRISM… Protect Yourself This Semester with Cybersecurity Tips from Malwarebytes Cecile Nguyen August 26, 2013 0 Comments What happens when you bring millions of 18- to 24-year-olds onto college and university campuses and have them connect to shared… Fake Browser Updates Going Rampant Jérôme Segura August 26, 2013 0 Comments The bad guys have been working on social engineering end users with fake ‘Critical updates’ for all major web browsers.Last month,… Bad Guys Gone Greedy: Multi-Pronged Attacks Found in the Wild Jérôme Segura August 24, 2013 0 Comments The success of a malicious attack is determined by several factors including how well it is crafted and what its distribution… Previous 1 … 597 598 599 600 601 … 618 Next Contributors Threat Center Podcast Glossary Scams