ALL POSTS Authentication for the Vulnerable: Cyber Criminals Check Credentials to Spread Malware Adam Kujawa May 16, 2013 0 Comments Once again, Skype has proven itself to be a valuable tool for the spread of malware and other malicious doings by… Online PC Support Scams: Turning the Tables Jérôme Segura May 9, 2013 0 Comments You may recall a post I wrote back in April about fake Microsoft phone support calls. I had received a call… New Internet Explorer 8 Zero Day Jérôme Segura May 3, 2013 0 Comments On the 1st of May (a date which many countries celebrate as Labor Day), the US Department of Labor’s website was… Tech support scams: a look behind the curtain Jérôme Segura May 1, 2013 0 Comments My previous post about fake support calls from Microsoft generated a lot of reactions. I was quite astounded by how many… Safeguarding your online accounts against hackers Jérôme Segura April 24, 2013 0 Comments It is very likely that you or someone you know has had one or multiple of their online accounts hacked into…. CTA: New Java Vulnerability Joshua Cannell April 23, 2013 0 Comments URGENT: Despite a recent critical patch to Java SE, Polish security firm Security Explorations released details of yet another Java vulnerability. … Too Tough to Crack? Joshua Cannell April 22, 2013 0 Comments During the course of your life, there are many times when you have to prove who you are. Whether it’s applying… Improvements to our Updating Process Marcin Kleczynski April 18, 2013 0 Comments It’s been a rough week here at Malwarebytes, and I’m sure for many of you as well. We’ve spent the entire… Cyber Criminals Never Waste A Tragedy Jérôme Segura April 18, 2013 0 Comments We are accustomed to seeing criminals take advantage of big events to push malware, so we always keep an eye out… Previous 1 … 591 592 593 594 595 … 602 Next Contributors Threat Center Podcast Glossary Scams