ALL POSTS Unusual Exploit Kit Targets Chinese Users (Part 1) Jérôme Segura May 28, 2015 0 Comments We are very accustomed to seeing the same exploit kits over and over. Angler EK, Nuclear EK or Fiesta EK all… Secure Boot Pieter Arntz May 28, 2015 0 Comments Secure Boot is an option in UEFI that allows you to make sure that your PC boots using only software that… Keygen Capers and Suurgle Surveys Jovi Umawing May 28, 2015 0 Comments While searching for potentially bogus key generators (or keygens) for our Malwarebytes products, we encountered a supposed tool for Kaspersky Anti-Virus. The… Scams Within Facebook Press On, Use “Facebook for Business” Hook Jovi Umawing May 27, 2015 0 Comments Following up on our previous blog post about rogue Facebook Recovery accounts floating around within the said social network, it appears that such accounts,… iPhone Crash: What You Need To Know Jean Taggart May 27, 2015 0 Comments TL;DR Receiving a specially crafted text message with lock screen message notification enabled crashes the iPhone. An interesting thread has emerged from the… Virus or Malware Pieter Arntz May 26, 2015 0 Comments Have you ever given up, when you were trying to explain the difference between viruses and malware? I must admit that I have. So… Tech Support Scammers Go For Pornographic Shocker Jérôme Segura May 26, 2015 0 Comments Crooks are making millions of dollars defrauding unsavvy users with fake online tech support. The scam is simple but yet effective… BSides London: The Writey Writer’s Workshop Christopher Boyd May 26, 2015 0 Comments Hello! I’m Chris (or at least, a past version of Chris as I’m currently on holiday). Past Chris, speaking to you… A Week in Security (May 17 – May 23) Malwarebytes Labs May 25, 2015 0 Comments Last week, we covered a number of security topics like scams, exploit kits, and a software flaw worth buzzing over.But before… Previous 1 … 525 526 527 528 529 … 616 Next Contributors Threat Center Podcast Glossary Scams