ALL POSTS SamSam ransomware: what you need to know Christopher Boyd May 1, 2018 0 Comments SamSam ransomware is a custom infection used in targeted attacks, often deployed using a wide range of exploits or brute-force tactics. Based… Spartacus ransomware: introduction to a strain of unsophisticated malware Vasilios Hioureas April 30, 2018 0 Comments Spartacus ransomware is a new sample that has been circulating in 2018. Written in C#, the original sample is obfuscated, which… A week in security (April 23 – April 29) Malwarebytes Labs April 30, 2018 0 Comments Last week, we dug into behavioral biometrics, explored a new crossrider variant, and embraced the power of “no.” We also launched another… Please don’t buy this: smart toys William Tsing April 27, 2018 0 Comments Smart toys attempt to offer what a lot of us imagined as kids—a toy that we can not only play with,… Malwarebytes CrackMe 2: try another challenge hasherezade April 27, 2018 0 Comments Last November, we released the first edition of the Malwarebytes CrackMe. Encouraged by the positive response we received from the security community,… The Internet of Everything and digital privacy: what you need to know Kayla Matthews April 26, 2018 0 Comments If you don’t already own Internet of Things (IoT) devices, you likely will soon. IoT-enabled devices are physical gadgets with built-in… Far Cry 5 download offers: embrace the power of “no” Christopher Boyd April 25, 2018 0 Comments The recently released Far Cry 5 is a video game where you reclaim Montana from a cult obsessed with the “power… Securing financial data of the future: behavioral biometrics explained Jovi Umawing April 24, 2018 0 Comments Some of us would be pretty excited about a brave, new passwordless world. Gone would be the days of having to… New Crossrider variant installs configuration profiles on Macs Thomas Reed April 24, 2018 0 Comments A new variant of the Crossrider adware has been spotted that is infecting Macs in a unique way. For the most… Previous 1 … 399 400 401 402 403 … 614 Next Contributors Threat Center Podcast Glossary Scams