ALL POSTS How to remove Koler ransomware from Android Armando Orozco May 7, 2014 0 Comments A new Android ransomware dubbed Koler has been spreading as a fake adult themed streaming service ‘BaDoink’ app. Uncovered by security researcher… Email-borne exploits: the not-so innocuous killers targeting small business Jérôme Segura May 7, 2014 0 Comments Update (05/21/2014): As previously suspected, other reports also support that CVE-2013-2729 is being used in malicious PDFs). Email remains a widely used infection… Facebook May 18 Deactivation Scam Jovi Umawing May 5, 2014 0 Comments A Week in Security (April 27 – May 3) Malwarebytes Labs May 5, 2014 0 Comments Here’s a review of last week’s posts on Malwarebytes Unpacked: Top news stories: Stay secure, everyone! The Malwarebytes Labs Team Fake and Bundled Malwarebytes Anti-Malware 2.0 Abound Jovi Umawing May 1, 2014 0 Comments A month after Malwarebytes CEO Marcin Kleczynski announced the launch of Malwarebytes Anti-Malware 2.0, we already started seeing executable files purporting… Sideloading Apps is a Dangerous Game Adam Kujawa April 30, 2014 0 Comments This post covers my adventures in trying to get a game I really like and have already paid for on the… Cyber-criminals interested in Microsoft Azure too Jérôme Segura April 29, 2014 0 Comments A phishing scam typically comes as an email purporting to be from your bank, Internet Service Provider, or any other online… Automating Malware Analysis with Cuckoo Sandbox Joshua Cannell April 29, 2014 0 Comments Analyzing malware can be a lengthy process. Malware today can be simple, like something that downloads another program from a rogue… Microsoft warns against new Internet Explorer Zero-Day UPDATED Jérôme Segura April 28, 2014 0 Comments Update (May 1, 2014): Microsoft has decided to release an out-of-band security update for CVE-2014-1776 and, in a surprising move, is also… Previous 1 … 542 543 544 545 546 … 590 Next Contributors Threat Center Podcast Glossary Scams