ALL POSTS HTTPS… Everywhere! Jérôme Boursier June 6, 2017 0 Comments We recently updated our redirections rule in HTTPS-Everywhere, a browser extension that automatically redirects you to the HTTPS version of the… Interview with a malware hunter: Pieter Arntz Wendy Zamora June 5, 2017 0 Comments Welcome to our new series: interview with a malware hunter. In these Q&A sessions, we’ll take you behind the scenes to… A week in security (May 29 – Jun 04) Malwarebytes Labs June 5, 2017 0 Comments Last week, we looked at a ransomware strain that appears to be a fake version of DMA Locker. We also focused on… Spotting fake reviews – have healthy online skepticism Jean Taggart June 1, 2017 0 Comments One of the most often pieces of advice I give when speaking to friends and relatives regarding online threats is to… Adware the series, part 4 Pieter Arntz May 31, 2017 0 Comments In this series of posts, we will be using the flowchart below to follow the process of determining which adware we are dealing… A week in security (May 22 – May 28) Malwarebytes Labs May 29, 2017 0 Comments Last week we informed you about several new threats, including the android ransomware that targets Tencent users. This SLocker.fh masquerades as… A stolen version of DMA Locker is making the rounds Malwarebytes Labs May 29, 2017 0 Comments Ransomware has become a popular criminal business with a relatively easy entrance. Even the people with little technical knowledge can build… RoughTed: the anti ad-blocker malvertiser Jérôme Segura May 25, 2017 0 Comments Given the recent renewed attention about ‘RoughTed’ and Kafeine‘s tweet, we wanted to clarify that RoughTed and associated domains are in fact part… Five unsettling cyberthreats William Tsing May 24, 2017 0 Comments Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. A SQL injection is a SQL injection, no matter… Previous 1 … 436 437 438 439 440 … 615 Next Contributors Threat Center Podcast Glossary Scams