ALL POSTS Removing the jam in your printer security Christopher Boyd October 30, 2018 0 Comments Printers are an important, invisible—albeit sometimes loud—component of the office. But all too often they’re filled with mystery meat icons, peculiar… Mobile Menace Monday: top five scariest mobile threats Nathan Collier October 29, 2018 0 Comments In the spirit of this upcoming Halloween season, we thought we’d provide you with a list of the top five scariest… Mac cryptocurrency ticker app installs backdoors Thomas Reed October 29, 2018 0 Comments An astute contributor to our forums going by the handle 1vladimir noticed that an app named CoinTicker was exhibiting some fishy… A week in security (October 22 – 28) Malwarebytes Labs October 29, 2018 0 Comments Last week on Malwarebytes Labs, we took a look at some new Mac malware, gave you a roundup of 2018 exploit… Scammers use old browser trick to create fake virus download Jérôme Segura October 26, 2018 0 Comments Tech support scammers are reusing an old technique in their existing browser locker (browlock) schemes to force a special kind of… Sextortion emails: They’re probably not watching you William Tsing October 25, 2018 0 Comments Back in July, Krebs on Security reported on a rather novel scam, where the threat actor would use credentials from old… Huge breach affects 9 million Cathay Pacific customers Christopher Boyd October 25, 2018 0 Comments Airlines aren’t having a good time of things at the moment. Even if you managed to dodge the recent British Airways… Mac malware intercepts encrypted web traffic for ad injection Thomas Reed October 24, 2018 0 Comments Last week, Malwarebytes researcher Adam Thomas found an interesting new piece of Mac malware that exhibits some troubling behaviors, including intercepting… Exploit kits: fall 2018 review Jérôme Segura October 24, 2018 0 Comments Exploit kit (EK) activity continues to surprise us as the weather cools, the leaves change, and we move into the fall of… Previous 1 … 384 385 386 387 388 … 617 Next Contributors Threat Center Podcast Glossary Scams