ALL POSTS RIG exploit kit takes on large malvertising campaign Jérôme Segura September 27, 2016 0 Comments There has been an interesting battle between two exploit kits in the past few months. Following the demise of the Angler… Komplex Mac backdoor answers old questions Thomas Reed September 27, 2016 0 Comments A new piece of Mac malware, dubbed Komplex, has been discovered by Palo Alto Networks. This malware provides a backdoor into… A week in security (Sep 18 – Sep 24) Malwarebytes Labs September 26, 2016 0 Comments Last week, we listed 10 ways one can secure their mobile devices, issued a warning about a scam posted on our… PUP Friday: Nikoff Security Thomas Reed September 23, 2016 0 Comments My attention was drawn a few weeks ago to a group of 6 apps in the Mac App Store, all made… Here’s your unlimited ATM card Pieter Arntz September 22, 2016 0 Comments This is not exactly a new kind of scam, but since some genius posted this on our Facebook page we want… Top 10 ways to secure your mobile phone Wendy Zamora September 21, 2016 0 Comments Seems like everywhere you turn, there’s news of another mobile security breach. Just last month, vulnerabilities in iOS 9.3.5 were being… Think tank summarizes what happens to healthcare records after breach Jovi Umawing September 21, 2016 0 Comments The Institute of Critical Infrastructure Technology (ICIT) has recently published a 54-page white paper entitled “Your Life, Repackaged and Resold: The Deep… Hosts file hijacks Pieter Arntz September 21, 2016 0 Comments In an earlier blog post about DNS hijacks, we briefly touched on the hosts file. The hosts file is like your… Just For Men website serves malware Jérôme Segura September 20, 2016 0 Comments The website for Just For Men, a company that sells various products for men as its name implies, was serving malware… Previous 1 … 460 461 462 463 464 … 614 Next Contributors Threat Center Podcast Glossary Scams