ALL POSTS Twitter app spams Fappening bait and Amazon surveys Christopher Boyd March 20, 2017 0 Comments With news of another so-called Fappening (nude photos of celebrities distributed without permission) doing the rounds, it was inevitable that scammers would… Chinese PUPs and backdoor drivers: making systems less secure since 2013 Zammis Clark March 20, 2017 0 Comments PUPs affect systems all across the world and are developed in many countries. A few weeks ago I came across an installer… Diamond Fox – part 1: introduction and unpacking Malwarebytes Labs March 17, 2017 0 Comments Diamond Fox (also known as Gorynch) is a stealer written in Visual Basic that has been present on the black market… How not to phish a security researcher on Twitter Christopher Boyd March 14, 2017 0 Comments You’ve compromised a few accounts. You’ve worked up a list of people most likely to click your links or send you personal… A week in security (Mar 6th – Mar 12th) Malwarebytes Labs March 14, 2017 0 Comments Last week, we had a bumper crop of blog posts for you to get your teeth into, including our Cybercrime Tactics… Adware vs. ad fraud Pieter Arntz March 13, 2017 0 Comments Adware and ad fraud are in the same business and both don’t care very much how they make money, as long… Explained: Spora ransomware Malwarebytes Labs March 10, 2017 0 Comments Nowadays, ransomware has become the most popular type of malware. Most of the new families are prepared by amateurs (script-kiddies) and… CryptoBlock ransomware and its C2 Malwarebytes Labs March 10, 2017 0 Comments CryptoBlock is an interesting ransomware to keep an eye on. We expect this to be a ransomware that is in development… Torify and analyze traffic for your VM Jérôme Boursier March 9, 2017 0 Comments Virtual machines are a great tool to run untrusted piece of software and analyzing the network activity. Most of the time,… Previous 1 … 444 445 446 447 448 … 615 Next Contributors Threat Center Podcast Glossary Scams