ALL POSTS Explained: Bug poaching Jovi Umawing July 15, 2016 0 Comments When we talk about online extortion, nowadays what comes to mind is ransomware, thanks to reports of new strains found almost… Untangling Kovter’s persistence methods Malwarebytes Labs July 14, 2016 0 Comments Kovter is a click-fraud malware famous from the unconventional tricks used for persistence. It hides malicious modules in PowerShell scripts as… Mac malware OSX.Keydnap steals keychain Thomas Reed July 13, 2016 0 Comments We blogged about the OSX.Backdoor.Eleanor malware that had just been discovered, last week.In rare turn of events in the Mac world,… Pokemon GO: Pokecoins survey scams choose you Christopher Boyd July 11, 2016 0 Comments Virtual reality is when you wear a helmet and flail your arms around at a computer generated game, hopefully without walking… A week in security (Jul 03 – Jul 09) Malwarebytes Labs July 11, 2016 0 Comments Last week, we discussed about another 419 scam, itemized 12 steps for secure online banking, differentiated two “intentional security holes”, spotlighted… PUP Friday: One Click, Many Downloads Jovi Umawing July 8, 2016 0 Comments Files that Malwarebytes Anti-Malware (MBAM) detect as OneClickDownloader are what we call bundlers. We have defined bundlers as a blend of… 12 steps to safer online banking Wendy Zamora July 8, 2016 0 Comments Gone are the days of balancing check books. The advent of online banking has made budget-keeping and bill-paying a convenient, if… Intentional security holes Pieter Arntz July 7, 2016 0 Comments Sinkholes and watering holes are two expressions not automatically associated with computer security, yet they are in use to describe two tactics… “Good luck with your games!” Christopher Boyd July 7, 2016 0 Comments I’ve seen some amazing claims of security in place on scam sites down the years, alongside dazzling statements with regards how… Previous 1 … 472 473 474 475 476 … 617 Next Contributors Threat Center Podcast Glossary Scams