ALL POSTS Malicious gaming extensions: a child’s play to infection Pieter Arntz April 3, 2018 0 Comments Did you ever lend your laptop to a child to play a video game, only to get it back filled with… Mobile Menace Monday: Fake WhatsApp can steal info from your phone Nathan Collier April 2, 2018 0 Comments Last month, a blogger at My Online Security reported receiving a spam comment containing WhatsApp Plus. Going through the process, they… A week in security (March 26 – April 01) Malwarebytes Labs April 2, 2018 0 Comments Last week, we looked at the thought process behind creating a ransomware decryptor, the inner workings of QuantLoader, the ways one… You down with P2P? 10 tips to secure your mobile payment app Jovi Umawing March 30, 2018 0 Comments If you look at the figures, you cannot deny that the eCommerce industry is steadily growing. More and more people are… TLS 1.3 is nearly here Christopher Boyd March 30, 2018 0 Comments TLS stands for “Transport Layer Security” and it’s rather important. Why’s that? Oh, I’m glad you asked. Here’s me, yelling my… The data breach epidemic: no info is safe Logan Strain March 29, 2018 0 Comments By now it’s obvious that data security technology and protocols haven’t kept pace with the needs of consumers. Even as more… Exploit kits: Winter 2018 review Jérôme Segura March 29, 2018 0 Comments In the past, we used to do a blog series on exploit kits where we would periodically check in on the… An in-depth malware analysis of QuantLoader Malwarebytes Labs March 28, 2018 0 Comments This guest post is written by Vishal Thakur, CSIRT/Salesforce. For more on Vishal, read his bio at the end of the… 10 ways to protect your Android phone Jovi Umawing March 28, 2018 0 Comments Android has been around for nearly a decade and has come a long way from its early wannabe iPhone days. New features,… Previous 1 … 402 403 404 405 406 … 614 Next Contributors Threat Center Podcast Glossary Scams