ALL POSTS Massive MacKeeper data breach Thomas Reed December 16, 2015 0 Comments Kromtech, the developer of MacKeeper, has suffered a major breach that has exposed more than 13 million users’ data.Chris Vickery, a security researcher… DNS Hijacks: Routers Pieter Arntz December 16, 2015 0 Comments Our Support department has noticed a significant increase in the number of people that have had their DNS settings hijacked. Not… “Steam VAC Remover” Leads to Mobile Offers Christopher Boyd December 15, 2015 0 Comments There are 398 game titles on Steam which make use of the Valve Anti-Cheat system (VAC for short), and should you… More Replica Automated Mails Lead to Fake Pharma Jovi Umawing December 15, 2015 0 Comments In a blog post last November, we talked about a replica YouTube notification spam that tells recipients about their “delayed/deferred mails”.If… 4 Things to Consider When Assessing Device Posture for Effective Network Access Control Malwarebytes Labs December 15, 2015 0 Comments By Benny CzarnyOne of the main reasons to have a NAC (Network Access Control) system in place is to keep risky devices… Comcast Customers Targeted In Elaborate Malvertising Attack Jérôme Segura December 14, 2015 0 Comments With the holiday season here, we are seeing a rise in online scams that attempt to trick victims into giving out personal information… A Week in Security (Dec 06 – Dec 12) Malwarebytes Labs December 14, 2015 0 Comments Last week, we touched on Tunecore’s breach, a phishing attempt at Lloyd’s bank, and a deeper look at the Chimera ransomware…. Spike in Malvertising Attacks Via Nuclear EK Pushes Ransomware Jérôme Segura December 11, 2015 0 Comments We’ve been monitoring a malvertising campaign very closely as it really soared during the past week. The actors involved seem to be… How does anti-malware work? Wendy Zamora December 11, 2015 0 Comments For the better part of 20 years, cybersecurity remained mostly under the public awareness radar. It was not exactly a topic… Previous 1 … 493 494 495 496 497 … 614 Next Contributors Threat Center Podcast Glossary Scams