ALL POSTS Your ISP, browsing history, and what to do about it William Tsing April 4, 2017 0 Comments In late March, Congress approved a bill lifting restrictions imposed on ISPs last year concerning what they could do with information… A week in security (Mar 27 – Apr 02) Malwarebytes Labs April 3, 2017 0 Comments Do we have blogs for you! Last week, we cracked open a big book of definitions on what packers, crypters, and… Steam spammers have a night at the movies Christopher Boyd March 31, 2017 0 Comments Users of gaming platform Steam have the ability to upload images from games, post messages, and more besides, into their social network… Tech support scammers and their banking woes William Tsing March 30, 2017 0 Comments We all know about tech support scams by this point. We know how they cold call, lie their way into your… What are exploits? (And why you should care) Wendy Zamora March 29, 2017 0 Comments Exploits: they’re not your mama’s cyberthreats. At one point in the not-so-distant past, exploits were responsible for delivering 80 percent of… Websites compromised in ‘Decimal IP’ campaign Jérôme Segura March 29, 2017 0 Comments When looking at malicious traffic, one of the things we are interested in are the hosts involved in a particular attack. For… Explained: Sage ransomware Malwarebytes Labs March 29, 2017 0 Comments Sage is yet another ransomware that has become a common threat nowadays. Similarly to Spora, it has capabilities to encrypt files… World of Warcraft phish campaign lures victims with free pet Christopher Boyd March 28, 2017 0 Comments A phishing campaign currently in circulation is attempting to bait World of Warcraft with the promise of free in-game pets. We’ve… A week in security (Mar 20th – Mar 26th) Malwarebytes Labs March 28, 2017 0 Comments Last week, we investigated Twitter app scammers using stolen celebrity nudes as bait, explored the world of Chinese PUPs and backdoors, took… Previous 1 … 441 442 443 444 445 … 614 Next Contributors Threat Center Podcast Glossary Scams