ALL POSTS An in-depth malware analysis of QuantLoader Malwarebytes Labs March 28, 2018 0 Comments This guest post is written by Vishal Thakur, CSIRT/Salesforce. For more on Vishal, read his bio at the end of the… 10 ways to protect your Android phone Jovi Umawing March 28, 2018 0 Comments Android has been around for nearly a decade and has come a long way from its early wannabe iPhone days. New features,… Encryption 101: Decryptor’s thought process Vasilios Hioureas March 27, 2018 0 Comments In the previous parts 1, 2 and 3 of this series, we covered the basics of encryption, walked through a live… What Facebook’s Cambridge Analytica problem means for your data Christopher Boyd March 26, 2018 0 Comments As you may already know, there’s been a security meltdown at Facebook, thanks to a company called Cambridge Analytica and Donald… Malicious cryptomining and the blacklist conundrum Jérôme Segura March 26, 2018 0 Comments When Coinhive first came out in September of 2017, it was fairly easy to identify websites using browser miners by looking… A week in security (March 19 – March 25) Malwarebytes Labs March 26, 2018 0 Comments Last week, we looked at the growing problem of smartphone addiction, how link rot is continually slicing down portions of the… “Celebrating Stephen Hawking” with a 419 scam Christopher Boyd March 23, 2018 0 Comments The recently departed Stephen Hawking is apparently back from the dead, now a target for scammers wanting to extract some quick… DDoS attacks are growing: What can businesses do? Pieter Arntz March 22, 2018 0 Comments Depending on the type and size of your organization, a DDoS (Distributed Denial of Service) attack can be anything from a… CyberByte steals Malwarebytes’ intellectual property Thomas Reed March 21, 2018 0 Comments At Malwarebytes, we frequently examine apps for detection as Potentially Unwanted Programs (PUPs). These are programs that exhibit a wide variety… Previous 1 … 404 405 406 407 408 … 615 Next Contributors Threat Center Podcast Glossary Scams