diff --git a/anti-behavioral-analysis/detect-debugger.md b/anti-behavioral-analysis/detect-debugger.md
index e4f3c139..01ecd4ba 100644
--- a/anti-behavioral-analysis/detect-debugger.md
+++ b/anti-behavioral-analysis/detect-debugger.md
@@ -53,9 +53,9 @@ Malware Examples
References
----------
-[1] Alexander Antukh, "Anti-debugging Techniques Cheat Sheet," 19 January 2015. http://antukh.com/blog/2015/01/19/malware-techniques-cheat-sheet/.
+[1] Alexander Antukh, "Anti-debugging Techniques Cheat Sheet," 19 January 2015. http://antukh.com/blog/2015/01/19/malware-techniques-cheat-sheet.
-[2] Joshua Cannell, Malwarebytes Labs, "Five Anti-Analysis Tricks that sometimes Fool Analysts," 31 March 2016. https://blog.malwarebytes.com/threat-analysis/2014/09/five-anti-debugging-tricks-that-sometimes-fool-analysts/.
+[2] Joshua Cannell, Malwarebytes Labs, "Five Anti-Analysis Tricks that sometimes Fool Analysts," 31 March 2016. https://blog.malwarebytes.com/threat-analysis/2014/09/five-anti-debugging-tricks-that-sometimes-fool-analysts.
[3] Peter Ferrie, "The 'Ultimate' Anti-Debugging Reference," 4 May 2011. https://anti-reversing.com/Downloads/Anti-Reversing/The_Ultimate_Anti-Reversing_Reference.pdf.
diff --git a/command-and-control/common-port.md b/command-and-control/common-port.md
index 9adc5958..f51ea136 100644
--- a/command-and-control/common-port.md
+++ b/command-and-control/common-port.md
@@ -2,7 +2,7 @@
|---------|------------------------|
|**ID**|**T1043**|
|**Objective(s)**|[Command and Control](https://github.com/MBCProject/mbc-markdown/tree/master/command-and-control)|
-|**Related ATT&CK Technique**|[Commonly Used Port](https://attack.mitre.org/techniques/T1043/), [Commonly Used Port (Mobile)](https://attack.mitre.org/techniques/T1436/)|
+|**Related ATT&CK Technique**|[Commonly Used Port](https://attack.mitre.org/techniques/T1043/), [Commonly Used Port - Mobile](https://attack.mitre.org/techniques/T1436/)|
Commonly Used Port
==================
diff --git a/impact/encrypt-impact.md b/impact/encrypt-impact.md
index 937e53a5..6dd01800 100644
--- a/impact/encrypt-impact.md
+++ b/impact/encrypt-impact.md
@@ -2,7 +2,7 @@
|---------|------------------------|
|**ID**|**E1486**|
|**Objective(s)**|[Impact](https://github.com/MBCProject/mbc-markdown/tree/master/impact)|
-|**Related ATT&CK Technique**|[Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486/), [Encrypt Files (Mobile)](https://attack.mitre.org/techniques/T1471/)|
+|**Related ATT&CK Technique**|[Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486/), [Encrypt Files - Mobile](https://attack.mitre.org/techniques/T1471/)|
Data Encrypted for Impact
@@ -25,4 +25,4 @@ References
[2] http://www.secureworks.com/cyber-threat-intelligence/threats/cryptolocker-ransomware/
-
\ No newline at end of file
+