ALL POSTS Trojans: What’s the real deal? Christopher Boyd July 25, 2018 0 Comments The fictional Greeks hiding in their legendary Trojan horse would probably be excited to learn that the default Wiki page for… New strain of Mac malware Proton found after two years Thomas Reed July 24, 2018 0 Comments Last week, Kaspersky reported on a new variant of the Mac malware Proton, which they have dubbed Calisto, that has been… Mobile Menace Monday: Adware MobiDash gets stealthy Nathan Collier July 23, 2018 0 Comments The Adware known as MobiDash, detected by Malwarebytes for Android as Android/Adware.MobiDash, is far from a new. However, this ad-displaying nuisance… A week in security (July 16 – July 22) Malwarebytes Labs July 23, 2018 0 Comments Last week on Labs, we looked at a Magniber expansion, explored open source vulnerabilities, and checked out the boons and drawbacks… The danger of third parties: ads, pipelines, and plugins Christopher Boyd July 20, 2018 0 Comments It may or may not be comforting to know that, ultimately, bulletproof security is out of your hands.You can have the… How to block ads like a pro Adam McNeil July 19, 2018 0 Comments In part one of this series, we had a look at a few reasons why you should be blocking online advertisements… What’s the real value—and danger—of smart assistants? Pieter Arntz July 18, 2018 0 Comments You’ve heard them called virtual assistants, digital personal assistants, voice assistants, or smart assistants. Operated by artificial intelligence, technologies such as… Cybercrime tactics & techniques Q2 2018 Malwarebytes Labs July 17, 2018 0 Comments A generally slow quarter reflects an overall lull in cybercrime, picking up where Q1 left off with cryptominers continuing to dominate,… 5 ways to find and fix open source vulnerabilities Malwarebytes Labs July 17, 2018 0 Comments Guest post by Limor WainsteinA recent discovery of surreptitious execution of cryptomining code by a sandboxed app, riding piggyback on the open… Previous 1 … 390 391 392 393 394 … 614 Next Contributors Threat Center Podcast Glossary Scams