ALL POSTS 10 easy steps to clean your infected computer Wendy Zamora June 22, 2015 0 Comments You log onto your computer and it takes forever to boot. When it finally does, a few unfamiliar applications litter your… AdChoices, interest based advertising Pieter Arntz June 19, 2015 0 Comments Did you ever notice the AdChoices icon while you were surfing?Ads like these show up all across the Internet. Sometimes our… The Infosec Europe and BSides London Round-up Christopher Boyd June 17, 2015 0 Comments It recently came to pass that about 15 percent of the Malwarebytes blog team flew into London for Infosec Europe, Bsides London… LastPass Security Notice Issued Christopher Boyd June 15, 2015 0 Comments Way back in 2011, LastPass had a bit of a security wobble as they noticed a “Network traffic anomaly” on one… Dutch Users Victim of Large Malvertising Campaign Jérôme Segura June 15, 2015 0 Comments Security firm Fox-IT has identified a large malvertising campaign that began affecting Dutch users on June 11.In their blog post, they say… A Week in Security (Jun 07 – Jun 13) Malwarebytes Labs June 15, 2015 0 Comments Last week, we published a timely scam, a malvertising campaign, the final section of the 2-part piece of a certain exploit kit, and a… Unusual Exploit Kit Targets Chinese Users (Part 2) Malwarebytes Labs June 12, 2015 0 Comments Recently, our researchers identified a strange exploit kit targeting Chinese domains. In that writeup, we talked about how the exploit kit… “For me? You shouldn’t have. No, really…” Christopher Boyd June 12, 2015 0 Comments Yesterday, we took a look at a Chrome extension designed to roll back time on shared, editable documents and let you… Complex Method of Obfuscation Found in Dropper RealShell Nathan Collier June 12, 2015 0 Comments The fight against malware is never-ending for a threat researcher, and in the mobile malware arena the fight is becoming more… Previous 1 … 520 521 522 523 524 … 614 Next Contributors Threat Center Podcast Glossary Scams