ALL POSTS New OSX.Dok malware intercepts web traffic Thomas Reed April 28, 2017 0 Comments Most Mac malware tends to be unsophisticated. Although it has some rather unpolished and awkward aspects, a new piece of Mac… System optimizers turning to tech support scams Pieter Arntz April 27, 2017 0 Comments A new trend, which was also pointed out in our Q1 cybercrime report, is the combination of PUPs and Tech Support… Terror EK going ‘pro’? Not quite yet Jérôme Segura April 26, 2017 0 Comments Since our last post on Terror EK, we haven’t really seen much activity from this exploit kit. However, in recent days… Adware the series, part 1 Pieter Arntz April 26, 2017 0 Comments In this series, we will be using the flowchart below to follow the process of determining which adware we are dealing… A story of fonts by the EITest HoeflerText campaign Jérôme Segura April 26, 2017 0 Comments One of the most common malware campaigns from compromised websites is known as EITest and has traditionally been redirecting victims towards… iCloud support scams Thomas Reed April 25, 2017 0 Comments iCloud is an increasingly large target for scams of all kinds. It’s a common target for scams involving phishing e-mails. The… How to fight security fatigue Wendy Zamora April 25, 2017 0 Comments We live in the age of the 24-hour news cycle. Each day, whether it’s from TV news, phone notifications, online browsing,… Do I have Malwarebytes or a tech support scam? William Tsing April 25, 2017 0 Comments A lot of companies don’t make clear who their tech support is, what their relationship to that group is, and what… Mobile Menace Monday: Securing your privacy on Android Nathan Collier April 24, 2017 0 Comments Whether you are a government employee with sensitive data stored on your mobile device or just a casual user that just… Previous 1 … 438 439 440 441 442 … 614 Next Contributors Threat Center Podcast Glossary Scams