ALL POSTS Safeguarding your online accounts against hackers Jérôme Segura April 24, 2013 0 Comments It is very likely that you or someone you know has had one or multiple of their online accounts hacked into…. CTA: New Java Vulnerability Joshua Cannell April 23, 2013 0 Comments URGENT: Despite a recent critical patch to Java SE, Polish security firm Security Explorations released details of yet another Java vulnerability. … Too Tough to Crack? Joshua Cannell April 22, 2013 0 Comments During the course of your life, there are many times when you have to prove who you are. Whether it’s applying… Improvements to our Updating Process Marcin Kleczynski April 18, 2013 0 Comments It’s been a rough week here at Malwarebytes, and I’m sure for many of you as well. We’ve spent the entire… Cyber Criminals Never Waste A Tragedy Jérôme Segura April 18, 2013 0 Comments We are accustomed to seeing criminals take advantage of big events to push malware, so we always keep an eye out… Yesterday’s Database Update Issue Marcin Kleczynski April 16, 2013 0 Comments It saddens me to report that at around 3 PM PST yesterday, Malwarebytes released a definitions update that disabled thousands of… Our New Digs Cecile Nguyen April 15, 2013 0 Comments It’s a beautiful day in our new neighborhood! Moving from a tiny, overly-crowded office to the shiny new Malwarebytes headquarters overlooking… Phone scammers call the wrong guy, get mad and trash PC Jérôme Segura April 11, 2013 0 Comments [ Need assistance? Please consult our Help & Resource Page ] Have you ever received a call from someone with a heavy… Surfing by proxy Pieter Arntz April 10, 2013 0 Comments Proxy (the authority to act for someone else) is a term that we use, when related to computers, to describe using… Previous 1 … 604 605 606 607 608 … 615 Next Contributors Threat Center Podcast Glossary Scams