ALL POSTS How do I get my employees to stop clicking on everything? William Tsing January 30, 2017 0 Comments If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has… Zbot with legitimate applications on board Malwarebytes Labs January 26, 2017 0 Comments Source code of the infamous ZeuS malware leaked in 2011. Since that time, many cybercriminals has adopted it and augmented with… VirLocker’s comeback; including recovery instructions Nathan Scott January 25, 2017 0 Comments VirLocker is in no way new, it has been making a mess of victim’s machines for quite a few years now…. Avoid these “Free Minecraft / Garry’s Mod” adverts Christopher Boyd January 25, 2017 0 Comments Garry’s Mod is a sandbox physics game which lets you manipulate ragdolls (effectively, static video game characters) into certain poses or player-made movies… Understanding the basics of two-factor authentication Pieter Arntz January 20, 2017 0 Comments Two-factor authentication (2FA) is the least complex version of multi-factor authorization (MFA) and was invented to add an extra layer of… Verified Twitter accounts compromised, get busy spamming Christopher Boyd January 19, 2017 0 Comments Update: Twitter only recommends that verified users enable 2FA on their accounts. They do, however, need to have a verified phone… Malwarebytes Labs Blog Comment Safari William Tsing January 19, 2017 0 Comments Comments on the Malwarebytes labs blog can be well written, valuable additions to our published work, and sometimes provide additional data… New Mac backdoor using antiquated code Thomas Reed January 18, 2017 0 Comments The first Mac malware of 2017 was brought to my attention by an IT admin, who spotted some strange outgoing network traffic from… From a fake wallet to a Java RAT Malwarebytes Labs January 18, 2017 0 Comments This malware came in a phishing e-mail – disguised as a Bitcoin wallet. After clicking the link, user receives a JAR… Previous 1 … 452 453 454 455 456 … 618 Next Contributors Threat Center Podcast Glossary Scams