Did you know that malvertising has been going on since the days of Myspace and Rhapsody?

We told you how to tell if you’re infected with malware. We told you how to clean up the infection if you get it. How about how to stop the infection from happening in the first place?

We told you how to tell if you're infected with malware. We told you how to clean up the infection if you get it. Now, here's how to prevent malware infection from happening in the first place.
blog.malwarebytes.com

Blurry previews and Facebook phishing

Here's a Facebook phish which uses the incredibly old technique of blurring the supposed page underneath the login prompt. This is supposed to tantalise victims with what they could see if only they hand over login details. This tactic has been around from Facebook and Tumblr all the way back to Mys...
blog.malwarebytes.com

How complex are the digital lives of teens? The NCSA takes a look.

A recent study reveals (if not confirm) what most people may have already perceived: that most teens navigate the Internet via their smartphones using various websites and apps, and that there is a “digital disconnect” between U.S. parents and their teen children, who are between 13-17 years of age.
blog.malwarebytes.com

Tech support scams coming as phishing pages that contain fake alerts urging you to call for immediate assistance are common place these days. In this post we examine a couple of sneaky techniques targeting Google Chrome users.

In this article we take a look at some tricks that target Google Chrome users to dupe them with the infamous tech support scam pop ups. In particular, we examine the fake address bar and alert dialogs which people have come to trust and yet can be deceiving.
blog.malwarebytes.com

Not all pups are cute. These PUPs can slow down your computer, display tons of annoying ads, collect private information and more! Learn how to spot these PUPS and keep your computer safe.

If you’ve ever downloaded software onto your computer, chances are you’ve unknowingly cluttered your machine with potentially unwanted programs.
blog.malwarebytes.com

Recently we got access to several elements of the espionage toolkit that has been captured attacking Vietnamese institutions. In this article we describe the process of extracting the final payload out of it’s cover.

Recently we got access to several elements of the espionage toolkit that has been captured attacking Vietnamese institutions. During the operation, the malware was used to dox 400,000 members of Vietnam Airlines.
blog.malwarebytes.com

Remote workers are often the weakest link in a company's cybersecurity defenses. Find out how your company can protect its network and remote employees from threats.

Remote workers are often the weakest link in a company's cybersecurity defenses. Find out how your company can protect its network and remote employees from threats.
blog.malwarebytes.com

Mining company Agnico Eagle Mines Limited wasn't getting the protection they needed from their traditional antivirus tool and turned to Malwarebytes to combat malware and exploits.

Malwarebytes Partners with Synus Technology to Bring Most Advanced Malware Detection and Remediation Solutions to Brazilian Market

Synus Technology, the leading importer and distributor of information security solutions in Brazil, is partnering up with Malwarebytes to bring the most advanced malware detection and remediation solutions to the Brazilian market.
press.malwarebytes.com
According to the U.S. Department of Justice, ransomware attacks have quadrupled this year amid the growing use of bitcoin and improved encryption software.
wsj.com|By Robert McMillan
This may be a new trend among browser hijackers, but it seems more than a coincidence that we found two browser hijackers using a very similar approach to reach their goal of taking victims to the sites of their choice.
blog.malwarebytes.com

We've been named to the Inc. 5000 list of the Fastest-Growing Private Companies in America for the second year in a row!

Read our press release here: https://press.malwarebytes.com/…/malwarebytes-named-to-th…/…

Provides software designed to protect consumers and businesses against advanced threats that consistently escape detection by traditional antivirus solutions.
inc.com
Malwarebytes added 31 new photos to the album: 2016 Black Hat.

The Malwarebytes crew at Black Hat 2016 in Las Vegas and our behind the scene photos of our "State of Ransomware" video: https://www.youtube.com/watch?v=Wa6cpGjwji8

We have all seen the current popularity and craze with PokemonGo, it's no surprise cyber-criminals would plan on using this to their advantage and imitate the game with malicious substitutions.

We have all seen the current popularity and craze with PokemonGo, it's no surprise cyber-criminals would plan on using this to their advantage and imitate the game with malicious substitutions.
blog.malwarebytes.com

On July 29, we published a blog titled “PUP Friday: Cleaning up with 5 star awards“, taking a look at a registry cleaner called RegCleanPro made by Systweak. The makers of Systweak software posted both to our blog comments and posted a blog on their website titled “How Malwarebytes Got It All Wrong with RegClean Pro“.

On July 29, we published a blog titled "PUP Friday: Cleaning up with 5 star awards", taking a look at a registry cleaner called RegCleanPro made by Systweak. W
blog.malwarebytes.com

Ransomware attacks are surging in the era of bitcoin according to this The Wall Street Journal article. Following the NASCAR racing team's ransomware attack, they began running Malwarebytes software helping them find and eliminate 10,000 malware infections.

According to the U.S. Department of Justice, ransomware attacks have quadrupled this year amid the growing use of bitcoin and improved encryption software.
wsj.com|By Robert McMillan

Did you know that about 70% of malvertising campaigns deliver ransomware as a payload? To learn more click below.

We wrote an article in 2014 about some fraudulent behaviors involving MacKeeper. Fast forward to 2016, and unfortunately, the story is much the same.

We wrote an article in 2014 about some fraudulent behaviors involving MacKeeper. Fast forward to 2016, and unfortunately, the story is much the same.
blog.malwarebytes.com

We very quickly found ourselves in a deep rabbit-hole of Mac crapware when researching a major developer of Mac PUPs (potentially unwanted programs), PCVARK.

Recently, Jérôme Segura forwarded me a link to a fake virus scam page that seemed to be Mac-related. I began to look into it, and very quickly found myself in a deep rabbit-hole of Mac crapware, all from a major developer of Mac PUPs (potentially unwanted programs), PCVARK.
blog.malwarebytes.com