ALL POSTS Browser-based fingerprinting: implications and mitigations Jérôme Segura August 29, 2016 0 Comments Update (04/12/2017): The INRIA has a tool to fingerprint browser extensions and detect other other browser leaks.Update (03/17/2017): Microsoft patched CVE-2017-0022, reported by… How to enable 2FA on the PlayStation Network Jovi Umawing August 27, 2016 0 Comments Four months ago, Sony announced that it will be beefing up the security of its PlayStation gaming platform by introducing two-factor… Blurry previews and Facebook phishing Christopher Boyd August 26, 2016 0 Comments Here’s a Facebook phish which uses the incredibly old technique of blurring the supposed page underneath the login prompt. This is… Unpacking the spyware disguised as antivirus Malwarebytes Labs August 25, 2016 0 Comments Recently we got access to several elements of the espionage toolkit that has been captured attacking Vietnamese institutions. During the operation,… Tech support scams and Google Chrome tricks Jérôme Segura August 25, 2016 0 Comments Tech support scams coming as phishing pages that contain fake alerts urging you to call for immediate assistance are common place these days…. How complex are the digital lives of teens? The NCSA takes a look. Jovi Umawing August 25, 2016 0 Comments The National Cyber Security Alliance (NSCA), a nonprofit organization that promotes the public awareness on cyber security, has released the results… How to secure your remote workers Wendy Zamora August 24, 2016 0 Comments Advances in networking and mobile technologies have enabled remote workforces on a global scale, whether that’s employing full-time staff members who… File-in-the-middle hijackers Pieter Arntz August 23, 2016 0 Comments We are not sure if this is going to be a new trend among browser hijackers, but it seems more than… Systweak Redux: our response Christopher Boyd August 22, 2016 0 Comments On July 29, we published a blog titled “PUP Friday: Cleaning up with 5 star awards“, taking a look at a registry… Previous 1 … 463 464 465 466 467 … 614 Next Contributors Threat Center Podcast Glossary Scams