ALL POSTS 5 safe ways to get back at spammers: a guide to wasting time Christopher Boyd September 11, 2018 0 Comments Everyone hates spam (apart from the people who send it). While many people simply report spam and delete, a few look… Assessing the security of a portable router: a look inside its hardware Jean Taggart September 10, 2018 0 Comments Network administrators should perform security assessments of hardware that they will provide their users, or particularly paranoid users might want to… A week in security (September 3 – 9) Malwarebytes Labs September 10, 2018 0 Comments Last week on Malwarebytes Labs, we looked at spyware going mainstream, how the popular game Fortnite sparks security concerns for Android users, and how… Mac App Store apps are stealing user data Thomas Reed September 7, 2018 0 Comments There is a concerning trend lately in the Mac App Store. Several security researchers have independently found different apps that are… Fortnite’s Google Play rebuff sparks security concerns for Android users Christopher Boyd September 6, 2018 0 Comments There’s been no small outbreak of chaos in mobile land recently, all because of an astonishingly popular game called Fortnite.Here’s the… When spyware goes mainstream Jovi Umawing September 5, 2018 0 Comments Stealware.Surveillanceware.Stalkerware.These are terms alternately used to effectively identify a file-based threat that has been around since 1996: spyware. More than two… A week in security (August 27 – September 2) Malwarebytes Labs September 3, 2018 0 Comments Last week, we looked at dubious antics in mobile land, a peculiar case of spam on the official Cardi B website,… Explained: regular expression (regex) Pieter Arntz August 31, 2018 0 Comments Regular expression, or “regex” for short, is a mathematical term for the theory used to describe regular languages. But in computing, regexes… Reversing malware in a custom format: Hidden Bee elements hasherezade August 30, 2018 0 Comments Malware can be made of many components. Often, we encounter macros and scripts that work as malicious downloaders. Some functionalities can… Previous 1 … 389 390 391 392 393 … 617 Next Contributors Threat Center Podcast Glossary Scams