ALL POSTS Right on Cue, Hijackers Pose as NSA Adam Kujawa August 27, 2013 0 Comments I suppose we all saw this coming, ransomware authors are now posing as the NSA, claiming to be using the PRISM… Protect Yourself This Semester with Cybersecurity Tips from Malwarebytes Cecile Nguyen August 26, 2013 0 Comments What happens when you bring millions of 18- to 24-year-olds onto college and university campuses and have them connect to shared… Fake Browser Updates Going Rampant Jérôme Segura August 26, 2013 0 Comments The bad guys have been working on social engineering end users with fake ‘Critical updates’ for all major web browsers. Last… Bad Guys Gone Greedy: Multi-Pronged Attacks Found in the Wild Jérôme Segura August 24, 2013 0 Comments The success of a malicious attack is determined by several factors including how well it is crafted and what its distribution… Jekyll App Sneaks into Apple’s App Store Armando Orozco August 23, 2013 0 Comments Apple, for the most part, has been able to escape the wrath of malware authors compared with its main competitor, Android. When… League of Legends Hacked, Credit Card Info Stolen Joshua Cannell August 21, 2013 0 Comments Yesterday, League of Legends developer Riot Games detailed in a blog post that accounts for their North American customers would require… Fake Malwarebytes Scammer Surveys Victims Adam Kujawa August 20, 2013 0 Comments Scammers are at it again with their attempts to get users to download unnecessary software, visit pointless (and potentially dangerous) sites… Zuckerberg’s Facebook Hack Raises Questions of Security, Privacy Jérôme Segura August 19, 2013 0 Comments Last week, a Palestinian hacker found a flaw in Facebook that allowed you to post on anybody’s wall, even if you… The Malware Archives: MS Office Files Joshua Cannell August 19, 2013 0 Comments Recently, I posted a blog about analyzing PDF files. In that post, we covered some basics of the PDF format and… Previous 1 … 571 572 573 574 575 … 591 Next Contributors Threat Center Podcast Glossary Scams