ALL POSTS Another OSX.Dok dropper found installing new backdoor Thomas Reed May 1, 2017 0 Comments On Friday a sophisticated Mac Trojan was discovered, called OSX.Dok, which installs malware designed to intercept all HTTP and HTTPS traffic. This… A week in security (Apr 24 – Apr 30) Malwarebytes Labs May 1, 2017 0 Comments Last week we gave some important tips on how to secure your privay on Android and we warned our readers about a new… New OSX.Dok malware intercepts web traffic Thomas Reed April 28, 2017 0 Comments Most Mac malware tends to be unsophisticated. Although it has some rather unpolished and awkward aspects, a new piece of Mac… System optimizers turning to tech support scams Pieter Arntz April 27, 2017 0 Comments A new trend, which was also pointed out in our Q1 cybercrime report, is the combination of PUPs and Tech Support… Terror EK going ‘pro’? Not quite yet Jérôme Segura April 26, 2017 0 Comments Since our last post on Terror EK, we haven’t really seen much activity from this exploit kit. However, in recent days… Adware the series, part 1 Pieter Arntz April 26, 2017 0 Comments In this series, we will be using the flowchart below to follow the process of determining which adware we are dealing… A story of fonts by the EITest HoeflerText campaign Jérôme Segura April 26, 2017 0 Comments One of the most common malware campaigns from compromised websites is known as EITest and has traditionally been redirecting victims towards… iCloud support scams Thomas Reed April 25, 2017 0 Comments iCloud is an increasingly large target for scams of all kinds. It’s a common target for scams involving phishing e-mails. The… How to fight security fatigue Wendy Zamora April 25, 2017 0 Comments We live in the age of the 24-hour news cycle. Each day, whether it’s from TV news, phone notifications, online browsing,… Previous 1 … 439 440 441 442 443 … 615 Next Contributors Threat Center Podcast Glossary Scams