ALL POSTS A Week in Security (Oct 12 – 18) Christopher Boyd October 20, 2014 0 Comments A weekly round-up of blog posts and interesting happenings in the news, you say? Step right this way! First, we take… “To get free Steam games, follow these 4 steps…” Christopher Boyd October 17, 2014 0 Comments Here’s a .tk URL claiming to offer up free Steam games located at free-steam-games-2014(dot)tk If you’re fond of seeing [Sic] pop… The Emulation Imitation Christopher Boyd October 17, 2014 0 Comments Back in the day, an obsolete video game console tended to equal dead games tied to the platform and unless you… More Free Facebook Hacking Sites Surface Online Jovi Umawing October 16, 2014 0 Comments Four months ago, I unmasked a Facebook “hacking” service called FBSniffing and how it really doesn’t really “hack” but instead sign in users to a mobile… Encountering the Wild PUP Adam Kujawa October 16, 2014 0 Comments The Internet is full of dangers; threats like malware, phishing attacks, hackers and drive-by exploits are some of the most commonly… Changes in the LSP stack Pieter Arntz October 13, 2014 0 Comments What does LSP stand for?LSP is short for Layered Service Provider. A Layered Service Provider is a file (.dll) using the… A Week in Security (Oct 05 – 11) Christopher Boyd October 13, 2014 0 Comments Another week, another round-up of news and breaking stories! On the Malwarebytes Unpacked blog, I looked at some phone numbers in… Mobile advertisers use malware tricks to get installs Armando Orozco October 10, 2014 0 Comments Deceptive advertising targeting Android users is an effective way of getting malware installed. Now some advertisers are using it to get… “Dear Important Business Proposal..” Jovi Umawing October 8, 2014 0 Comments Carter Ham, a retired four-star United States Army general, is supposedly on Linkedin—and he wants you (to read his personal message). Dat message… Previous 1 … 546 547 548 549 550 … 614 Next Contributors Threat Center Podcast Glossary Scams