ALL POSTS Encountering the Wild PUP Adam Kujawa October 16, 2014 0 Comments The Internet is full of dangers; threats like malware, phishing attacks, hackers and drive-by exploits are some of the most commonly… Changes in the LSP stack Pieter Arntz October 13, 2014 0 Comments What does LSP stand for? LSP is short for Layered Service Provider. A Layered Service Provider is a file (.dll) using… A Week in Security (Oct 05 – 11) Christopher Boyd October 13, 2014 0 Comments Another week, another round-up of news and breaking stories! On the Malwarebytes Unpacked blog, I looked at some phone numbers in… Mobile advertisers use malware tricks to get installs Armando Orozco October 10, 2014 0 Comments Deceptive advertising targeting Android users is an effective way of getting malware installed. Now some advertisers are using it to get… “Dear Important Business Proposal..” Jovi Umawing October 8, 2014 0 Comments Carter Ham, a retired four-star United States Army general, is supposedly on Linkedin—and he wants you (to read his personal message). Dat message… Here, Vishy Vishy… Christopher Boyd October 7, 2014 0 Comments Voice phishing – Vishing, for short – has been around for a long time and is all about using the phone… A Week in Security (Sept 28 – Oct 04) Malwarebytes Labs October 6, 2014 0 Comments Last week, we at Malwarebytes Unpacked tackled on topics related to a phishing campaign targeting AOL and Outlook users, Android, gaming, threat analysis,… “A Pop Star Wants You in their New Video…” Christopher Boyd October 6, 2014 0 Comments We’ve seen a pair of Twitter accounts which sport MTV logos and are playing a part in trying to make people think… Malware and PUP Disguised as Twitch Bombing Tools Jovi Umawing October 3, 2014 0 Comments Here’s a scenario: Suppose you went live on Twitch to stream your playthrough of Destiny. Suppose you were getting a lot of… Previous 1 … 535 536 537 538 539 … 602 Next Contributors Threat Center Podcast Glossary Scams