ALL POSTS A week in security (August 27 – September 2) Malwarebytes Labs September 3, 2018 0 Comments Last week, we looked at dubious antics in mobile land, a peculiar case of spam on the official Cardi B website,… Explained: regular expression (regex) Pieter Arntz August 31, 2018 0 Comments Regular expression, or “regex” for short, is a mathematical term for the theory used to describe regular languages. But in computing, regexes… Reversing malware in a custom format: Hidden Bee elements hasherezade August 30, 2018 0 Comments Malware can be made of many components. Often, we encounter macros and scripts that work as malicious downloaders. Some functionalities can… Fileless malware: getting the lowdown on this insidious threat Vasilios Hioureas August 29, 2018 0 Comments Traditionally, malware attacks as we have always known them are files written to disk in one form or another that require… Official Cardi B website plagued by spammers Christopher Boyd August 28, 2018 0 Comments We come bearing tidings of proper website maintenance and general housekeeping for singer Cardi B (or rather, for her web development… Mobile Menace Monday: FakeGift is the gift that keeps on frustrating Nathan Collier August 27, 2018 0 Comments Last spring, we found yet another piece of riskware on Google Play we call Android/PUP.Riskware.FakeGift. Based on Hindi characters found in… A week in security (August 20 – August 26) Malwarebytes Labs August 27, 2018 0 Comments Last week on Labs, we took a look at insider threats, doubled back on the privacy of search browser extensions, profiled… Green card scams: preying on the desperate William Tsing August 24, 2018 0 Comments Thanks to @nullcookies for providing leads.Most online scams depend on two things for success: a broken or otherwise onerous process to… Can search extensions keep your searches private? Pieter Arntz August 23, 2018 0 Comments One of the most common things most of us do on the Internet is search, whether we are looking up the… Previous 1 … 390 391 392 393 394 … 617 Next Contributors Threat Center Podcast Glossary Scams