ALL POSTS Unpacking the spyware disguised as antivirus Malwarebytes Labs August 25, 2016 0 Comments Recently we got access to several elements of the espionage toolkit that has been captured attacking Vietnamese institutions. During the operation,… Tech support scams and Google Chrome tricks Jérôme Segura August 25, 2016 0 Comments Tech support scams coming as phishing pages that contain fake alerts urging you to call for immediate assistance are common place these days…. How complex are the digital lives of teens? The NCSA takes a look. Jovi Umawing August 25, 2016 0 Comments The National Cyber Security Alliance (NSCA), a nonprofit organization that promotes the public awareness on cyber security, has released the results… How to secure your remote workers Wendy Zamora August 24, 2016 0 Comments Advances in networking and mobile technologies have enabled remote workforces on a global scale, whether that’s employing full-time staff members who… File-in-the-middle hijackers Pieter Arntz August 23, 2016 0 Comments We are not sure if this is going to be a new trend among browser hijackers, but it seems more than… Systweak Redux: our response Christopher Boyd August 22, 2016 0 Comments On July 29, we published a blog titled “PUP Friday: Cleaning up with 5 star awards“, taking a look at a registry… PokemonGo Ransomware comes with some clever tricks Malwarebytes Labs August 22, 2016 0 Comments We have all seen the current popularity and craze with PokemonGo, it’s no surprise cyber-criminals would plan on using this to… A week in security (Aug 14 – Aug 20) Malwarebytes Labs August 22, 2016 0 Comments Last week, we published two blog posts about the Shakti Trojan: first, an overview of what it is (an information stealer… PUP Friday: MacKeeper Thomas Reed August 19, 2016 0 Comments MacKeeper first crossed my path more than five years ago. At that time, I was very active on Apple’s forums, and saw many… Previous 1 … 464 465 466 467 468 … 615 Next Contributors Threat Center Podcast Glossary Scams