ALL POSTS Android Trojan xHelper uses persistent re-infection tactics: here’s how to remove Nathan Collier February 12, 2020 0 Comments We first stumbled upon the nasty Android Trojan xHelper, a stealthy malware dropper, in May 2019. By mid-summer 2019, xHelper was topping… Malwarebytes Labs releases 2020 State of Malware Report Malwarebytes Labs February 11, 2020 0 Comments Today is Safer Internet Day—and what better way to celebrate/pay homage than to immerse yourself in research on the latest in… Battling online coronavirus scams with facts David Ruiz February 10, 2020 0 Comments UPDATE 03/05/2020: Yesterday, our malware intelligence researchers found a clever ploy to hide an info-stealer behind a website that purported to… A week in security (February 3 – 9) Malwarebytes Labs February 10, 2020 0 Comments Last week on Malwarebytes Labs, we looked at Washington state’s latest efforts in providing better data privacy rights for their residents,… Google Maps: online interventions with offline ramifications Malwarebytes Labs February 7, 2020 0 Comments The places where online life directly intersection with that lived offline will be forever fascinating, illustrated perfectly through a recent performance… Adposhel adware takes over browser push notifications administration Pieter Arntz February 6, 2020 0 Comments Since late last year, our researchers have been monitoring new methods being deployed by cybercriminals to potentially abuse browser push notifications…. Fintech security: the challenges and fails of a new era Pieter Arntz February 5, 2020 0 Comments “I have no idea how this app from my bank works, and I don’t trust what I don’t understand.” Josh is… Washington Privacy Act welcomed by corporate and nonprofit actors David Ruiz February 4, 2020 0 Comments The steady parade of US data privacy legislation continued last month in Washington with the introduction of an improved bill that… A week in security (January 27 – February 2) Malwarebytes Labs February 3, 2020 0 Comments Last week on Malwarebytes Labs, we looked at the strengths and weaknesses of the Zero Trust model, gave you the low-down… Previous 1 … 338 339 340 341 342 … 614 Next Contributors Threat Center Podcast Glossary Scams