ALL POSTS Intentional security holes Pieter Arntz July 7, 2016 0 Comments Sinkholes and watering holes are two expressions not automatically associated with computer security, yet they are in use to describe two tactics… “Good luck with your games!” Christopher Boyd July 7, 2016 0 Comments I’ve seen some amazing claims of security in place on scam sites down the years, alongside dazzling statements with regards how… New Mac backdoor malware: Eleanor Thomas Reed July 6, 2016 0 Comments A new piece of malware for Mac OS X has been discovered, according to a blog post from Bitdefender.This malware, which… NASA Kepler Twitter feed compromised… Christopher Boyd July 6, 2016 0 Comments Any organisation or individual can fall foul of a Twitter compromise, with Exhibit A being the feed for NASA’s Kepler. In case you… Malvertising slowing down, but not out Jérôme Segura July 4, 2016 0 Comments We have not seen very many large scale malvertising attacks following the mysterious disappearance of the powerful Angler EK. The ones we… A week in security (Jun 26 – Jul 02) Malwarebytes Labs July 4, 2016 0 Comments Last week, we talked about a new 419 scam that our researchers found in the wild and pushed out a follow… 419 scam: pay $180, receive $5,000 a week Christopher Boyd July 4, 2016 0 Comments Steer clear of the below 419 spam mail, which tries to make an offer you can’t possibly refuse (protip: totally refuse it).The… Satana ransomware – threat coming soon? Malwarebytes Labs June 29, 2016 0 Comments Petya ransomware is quickly becoming a household name and in typical cyber-criminal fashion, copycat families are starting to emerge.In this post, we have the… Analyzing baby ransomware Adam Kujawa June 29, 2016 0 Comments Ransomware is a serious threat we deal with everyday and a lot of our posts focus on analyzing the technical details… Previous 1 … 476 477 478 479 480 … 620 Next Contributors Threat Center Podcast Glossary Scams