ALL POSTS Malwarebytes.org is now Malwarebytes.com Marcin Kleczynski June 28, 2016 0 Comments Over the last few weeks, you may have seen many of the assets on Malwarebytes.org transition to Malwarebytes.com. I’m here to… Tech support scammer follow-up Pieter Arntz June 27, 2016 0 Comments This post is a sequel to Tech support scammers using Winlogon. As we have found after writing that post there are… A week in security (Jun 19 – Jun 25) Malwarebytes Labs June 27, 2016 0 Comments Last week, we touched on Acer’s breach on their e-commerce site and explained what typosquatting is plus why it continues to… Explained: typosquatting [updated] Pieter Arntz June 23, 2016 0 Comments Typosquatting is a term you may have seen when reading about Internet scams. In essence it relies on users making typing… Malvertising and ransomware: the Bonnie and Clyde of advanced threats Wendy Zamora June 22, 2016 0 Comments A lot of folks in the business (and consumer) world are shaking in their boots about ransomware. It’s understandable. Ransomware is… Malware uses Google Talk to make malicious phone calls Nathan Collier June 20, 2016 0 Comments We found a new piece of mobile malware, Android/Trojan.Pawost, that’s using Google Talk to make malicious calls.As soon as the malicious… Acer: lengthy data breach discovered Christopher Boyd June 20, 2016 0 Comments Acer, well known manufacturer of laptops, TVs, and other goods, has announced a long-running breach (active for nearly a year), targeting… A week in security (Jun 12 – Jun 18) Malwarebytes Labs June 20, 2016 0 Comments Last week, we uncovered a truth about malvertising, briefed our readers on email spoofing, disclosed advanced phishing tactics used by PayPal… A look at the Angler-less exploit kit scene Jérôme Segura June 17, 2016 0 Comments For those tracking exploit kits, the disappearance of the Angler exploit kit last week was a major event. While a lot of… Previous 1 … 474 475 476 477 478 … 617 Next Contributors Threat Center Podcast Glossary Scams