Microsoft Malware Protection Center

Threat Research & Response Blog

Browse by Tags

  • Blog Post: Extracting the fare

    When malware is found lurking on a system, quite often it isn't acting alone. Once malware distributors have control of a system, they will do everything they can to compromise the machine and the user for maximum gain -- for instance, hijacking a browser's search results, or using rogue security software...