SUBSCRIBE rss ALL POSTS Yesterday’s Database Update Issue Marcin Kleczynski April 16, 2013 0 Comments It saddens me to report that at around 3 PM PST yesterday, Malwarebytes released a definitions update that disabled thousands of… Our New Digs Cecile Nguyen April 15, 2013 0 Comments It’s a beautiful day in our new neighborhood! Moving from a tiny, overly-crowded office to the shiny new Malwarebytes headquarters overlooking… Phone scammers call the wrong guy, get mad and trash PC Jérôme Segura April 11, 2013 0 Comments [ Need assistance? Please consult our Help & Resource Page ] Have you ever received a call from someone with a… Surfing by proxy Pieter Arntz April 10, 2013 0 Comments Proxy (the authority to act for someone else) is a term that we use, when related to computers, to describe using… Redkit Exploit Kit does the splits Jérôme Segura April 5, 2013 0 Comments Exploit Kit authors must really love Java . Not only is it ripe with vulnerabilities but its own language provides a… Malware in a Jar Joshua Cannell April 3, 2013 0 Comments As researchers find more security flaws in Oracle Java, the software continues to be used for exploitation and malware delivery. This… Malwarebytes Hit by Targeted Attack! Adam Kujawa April 1, 2013 0 Comments Dear Readers, We regret to inform you that over the weekend, Malwarebytes was under direct, targeted attack from a new type… Who is ‘Whois’ ? Joshua Cannell March 26, 2013 0 Comments On March 20th, reports were circulating that a cyberattack had been conducted against broadcast networks and banks in South Korea. In… Hoaxes Pieter Arntz March 25, 2013 0 Comments A hoax ( to trick into believing or accepting as genuine something false and often preposterous ) is the word we… Previous 1 … 529 530 531 532 533 … 539 Next Contributors Threat Center Podcast Glossary Scams