ALL POSTS The Emulation Imitation Christopher Boyd October 17, 2014 0 Comments Back in the day, an obsolete video game console tended to equal dead games tied to the platform and unless you… More Free Facebook Hacking Sites Surface Online Jovi Umawing October 16, 2014 0 Comments Four months ago, I unmasked a Facebook “hacking” service called FBSniffing and how it really doesn’t really “hack” but instead sign in users to a mobile… Encountering the Wild PUP Adam Kujawa October 16, 2014 0 Comments The Internet is full of dangers; threats like malware, phishing attacks, hackers and drive-by exploits are some of the most commonly… Changes in the LSP stack Pieter Arntz October 13, 2014 0 Comments What does LSP stand for? LSP is short for Layered Service Provider. A Layered Service Provider is a file (.dll) using… A Week in Security (Oct 05 – 11) Christopher Boyd October 13, 2014 0 Comments Another week, another round-up of news and breaking stories! On the Malwarebytes Unpacked blog, I looked at some phone numbers in… Mobile advertisers use malware tricks to get installs Armando Orozco October 10, 2014 0 Comments Deceptive advertising targeting Android users is an effective way of getting malware installed. Now some advertisers are using it to get… “Dear Important Business Proposal..” Jovi Umawing October 8, 2014 0 Comments Carter Ham, a retired four-star United States Army general, is supposedly on Linkedin—and he wants you (to read his personal message). Dat message… Here, Vishy Vishy… Christopher Boyd October 7, 2014 0 Comments Voice phishing – Vishing, for short – has been around for a long time and is all about using the phone… A Week in Security (Sept 28 – Oct 04) Malwarebytes Labs October 6, 2014 0 Comments Last week, we at Malwarebytes Unpacked tackled on topics related to a phishing campaign targeting AOL and Outlook users, Android, gaming, threat analysis,… Previous 1 … 526 527 528 529 530 … 593 Next Contributors Threat Center Podcast Glossary Scams