ALL POSTS A Week in Security (May 17 – May 23) Malwarebytes Labs May 25, 2015 0 Comments Last week, we covered a number of security topics like scams, exploit kits, and a software flaw worth buzzing over.But before… Fake Adblocker Bylekh is an LSP Hijacker Pieter Arntz May 24, 2015 0 Comments Recently, one of our researchers found a prime example of to what lengths advertisement pushers are willing to go, just to… Fraud Can Happen Anytime, Anywhere, and to Anyone Malwarebytes Labs May 22, 2015 0 Comments We’re no strangers to fraud. Thanks to the digital age, most of us at least have an idea that stealing something… “Facebook Recovery” Accounts Share Phishing Link, Offer Tech Support Jovi Umawing May 21, 2015 0 Comments We’ve seen a certain j.mp shortened URL being shared by what we believe are rogue (if not compromised) accounts within Facebook a couple of… The Logjam Attack: What You Need to Know Joshua Cannell May 20, 2015 0 Comments A group of security researchers and computer scientists have recently uncovered a vulnerability in how a Diffie-Hellman key exchange is deployed… Malwarebytes Unpacked Nominated for Best Corporate Security Blog Malwarebytes Labs May 20, 2015 0 Comments …and we couldn’t be any more psyched! Our huge thanks to those who named us—you know who you are—seeing that this is… Angler Exploit Kit Gives Up on Malwarebytes Users Jérôme Segura May 19, 2015 0 Comments It is a well-known fact that malware authors try really hard to avoid security researchers and their analysis tools. For instance,… Bitly Imitation Leads to Malware Download Jovi Umawing May 18, 2015 0 Comments URL shortening services can be a marketing person’s and social media buff’s best friend. However, they can become a cause of worry for… A Week in Security (May 10 – May 16) Malwarebytes Labs May 18, 2015 0 Comments It’s been a busy week on the blog, with many different angles of attack covered. First off, we looked at a… Previous 1 … 527 528 529 530 531 … 617 Next Contributors Threat Center Podcast Glossary Scams