ALL POSTS UEFI, SecureBoot, and dual booting Windows 8 and Linux Jean Taggart May 9, 2014 0 Comments In this post I will explain UEFI (Unified Extensible Firmware Interface) and its predecessor, the BIOS/MBR, as well as the challenges… Fake Paranormal Videos Haunting Facebook Users Christopher Boyd May 8, 2014 0 Comments Welcome to a spooky Halloween blog – in May!Sort of. We’ve seen a number of scary / ghostly / Facebook scams… More PUPs Sighted, Using Instagram as Lure Jovi Umawing May 7, 2014 0 Comments With news of Instagram finally beating Twitter in terms of overall usage, it’s high time that we stop, look back, and remind… How to remove Koler ransomware from Android Armando Orozco May 7, 2014 0 Comments A new Android ransomware dubbed Koler has been spreading as a fake adult themed streaming service ‘BaDoink’ app.Uncovered by security researcher Kafeine,… Email-borne exploits: the not-so innocuous killers targeting small business Jérôme Segura May 7, 2014 0 Comments Update (05/21/2014): As previously suspected, other reports also support that CVE-2013-2729 is being used in malicious PDFs).Email remains a widely used infection vector… Facebook May 18 Deactivation Scam Jovi Umawing May 5, 2014 0 Comments A Week in Security (April 27 – May 3) Malwarebytes Labs May 5, 2014 0 Comments Here’s a review of last week’s posts on Malwarebytes Unpacked: Top news stories: Stay secure, everyone! The Malwarebytes Labs Team Fake and Bundled Malwarebytes Anti-Malware 2.0 Abound Jovi Umawing May 1, 2014 0 Comments A month after Malwarebytes CEO Marcin Kleczynski announced the launch of Malwarebytes Anti-Malware 2.0, we already started seeing executable files purporting… Sideloading Apps is a Dangerous Game Adam Kujawa April 30, 2014 0 Comments This post covers my adventures in trying to get a game I really like and have already paid for on the… Previous 1 … 565 566 567 568 569 … 614 Next Contributors Threat Center Podcast Glossary Scams