ALL POSTS The curious case of recurring “Page disabled” Facebook scams Jovi Umawing August 4, 2016 0 Comments Remember those fake Facebook Security pages we’ve documented earlier this year? Here’s a quick refresher if not: Recently, we noticed a… A look into Neutrino EK’s jQueryGate Jérôme Segura August 3, 2016 0 Comments In the cybercrime landscape, Exploit Kits (EKs) are the tool of choice to infect endpoints by exploiting software vulnerabilities. However, a… Tech support scams, two for the price of one Pieter Arntz August 2, 2016 0 Comments If you have read the blog post about Tech Support Scammers using the Winlogon Shell registry value, you know the basics… Google’s featured snippets abused by SEO scammers Jérôme Segura August 1, 2016 0 Comments Many people wonder why websites, even very small ones such as personal blogs, ever get hacked. While there are many possible… A week in security (Jul 24 – Jul 30) Malwarebytes Labs August 1, 2016 0 Comments Last week, we talked about a donation 419 scam, gave an overview of what an APT is, counted the ways one… Unpacking yet another .NET crypter Malwarebytes Labs July 29, 2016 0 Comments In this post, we will study one of the malicious executables recently delivered by RIG Exploit Kit. It is packed in a… The IPExpo / Infosec Europe / Blogger Awards roundup Christopher Boyd July 29, 2016 0 Comments For the last few months, Malwarebytes has been representing at some of the biggest security events in England, along with a couple… PUP Friday: Cleaning up with 5 star awards Jovi Umawing July 29, 2016 0 Comments Systweak’s RegClean Pro is quite a popular software. Top Ten Reviews, a consumer review portal based in Utah, has ranked it… Five ways to stay safe online while playing Pokémon Go Jovi Umawing July 28, 2016 0 Comments Ah, Pokémon Go. Most of us have heard about it, played it, and (probably for some) been concerned by it.Since its… Previous 1 … 467 468 469 470 471 … 615 Next Contributors Threat Center Podcast Glossary Scams