ALL POSTS Explained: like-farming Pieter Arntz April 18, 2019 0 Comments Like-farming, aka like-harvesting, is a method used by commercial parties and scammers alike to raise the popularity of a site or… Malware targeting industrial plants: a threat to physical security Pieter Arntz April 17, 2019 0 Comments We live in a world where more and more manufacturing processes are controlled by computers that send instructions to robots. This… Hackers snab emails and more in Microsoft Outlook, Hotmail, and MSN compromise Christopher Boyd April 16, 2019 0 Comments Long-time users of certain Microsoft products, such as Hotmail, MSN, and Outlook found they may be wrapped up in a hack… Electrum Bitcoin wallets under siege Malwarebytes Labs April 16, 2019 0 Comments By Adam Thomas and Jérôme Segura, with additional contributions from Vasilios Hioueras and S!RiSince at least late December 2018, many users… Ellen DeGeneres giveaway scam spreading on social media Christopher Boyd April 15, 2019 0 Comments Scammers are pushing multiple fake Facebook profiles of Ellen DeGeneres, popular US TV show host and producer, with the goal of… A week in security (April 8 – 14) Malwarebytes Labs April 15, 2019 0 Comments Last week on Labs, we said hello to Baldr, a new stealer on the market, we wondered who is managing the… Fake Instagram assistance apps found on Google Play are stealing passwords Nathan Collier April 12, 2019 0 Comments We all want those Instagram likes and followers. Many apps on Google Play claim they can assist you with that effort…. What is personal information? Or personally identifiable information? In legal terms, it depends David Ruiz April 11, 2019 0 Comments In early March, cybersecurity professionals around the world filled the San Francisco Moscone Convention Center’s sprawling exhibition halls to discuss and… Who is managing the security of medical management apps? Kacy Zurkus April 10, 2019 0 Comments One truth that is consistent across every sector—be it technology or education—is that software is vulnerable, which means that any device… Previous 1 … 365 366 367 368 369 … 614 Next Contributors Threat Center Podcast Glossary Scams