Quantcast
Channel: Malwarebytes Unpacked » Joshua Cannell
Browsing all 81 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Malwarebiter – Biting down on you

UPDATE: As of 1/28, the Facebook page for Malwarebiter appears to have been deleted. Overview A few days ago Malwarebytes Intelligence Analyst Adam Kujawa released a Cyber-Threat Advisory on a fairly...

View Article



Image may be NSFW.
Clik here to view.

Tools of the Trade: Exploit Kits

Exploit Kits are a serious cyber threat today, estimated to be responsible for the vast percentage of malware infections worldwide.  Exploit kits distributed currently through both public and...

View Article

Image may be NSFW.
Clik here to view.

CTA: New Adobe Zero-Day

URGENT: A few days ago a new zero-day vulnerability in Adobe Reader had surfaced.  Details below are on Adobe’s blog. ACTION: Unfortunately, a patch that fixes the issue is still in the works.  In the...

View Article

Malwarebytes and BSides San Francisco

For many years now, computer security conferences have been a common way for researchers, hackers, and security experts to meet and discuss the latest industry developments.  In addition to the...

View Article

Image may be NSFW.
Clik here to view.

CTA: New Java Zero-Days

Update: Oracle has addressed the exploit known as CVE-2013-1493 with an emergency patch.  You can read about this patch on Oracle’s blog here. URGENT: A few days ago we heard about yet another...

View Article


Image may be NSFW.
Clik here to view.

Obfuscation: Malware’s best friend

Here at Malwarebytes, we see a lot of malware. Whether it’s a botnet used to attack web servers or a ransomware stealing your files, much of today’s malware wants to stay hidden during infection and...

View Article

Image may be NSFW.
Clik here to view.

From Russia with Ransomware

This week the research team stumbled across a Russian ransomware sample so I decided to take a peek.  The ransom message demands your money (in rubles, actually) and threatens to delete your data if...

View Article

Image may be NSFW.
Clik here to view.

Who is ‘Whois’ ?

On March 20th, reports were circulating that a cyberattack had been conducted against broadcast networks and banks in South Korea.  In typical reaction, it was suspected that North Korea may have been...

View Article


Image may be NSFW.
Clik here to view.

Malware in a Jar

As researchers find more security flaws in Oracle Java, the software continues to be used for exploitation and malware delivery.  This year has been a shaky start for the cross-platform web...

View Article


Image may be NSFW.
Clik here to view.

Too Tough to Crack?

During the course of your life, there are many times when you have to prove who you are.  Whether it’s applying for a loan, getting your driver’s license, or signing into your email account, a process...

View Article

Image may be NSFW.
Clik here to view.

CTA: New Java Vulnerability

URGENT: Despite a recent critical patch to Java SE, Polish security firm Security Explorations released details of yet another Java vulnerability.  Adam Gowdiak, a researcher from the firm provides a...

View Article

Image may be NSFW.
Clik here to view.

Nowhere to Hide: Three methods of XOR obfuscation

A couple of months ago, I did an article on generic obfuscation techniques used to hide malware.  It continues to be no surprise that malware tries to hide using an array of techniques that are easy...

View Article

Image may be NSFW.
Clik here to view.

Brazilian Facebook Trojan and Consumer Security

Recently a Microsoft blog was released describing a new Facebook Trojan classified as JS.Febipos.A by several AV vendors. Febipos is currently active in Brazil and takes control of your Facebook...

View Article


Image may be NSFW.
Clik here to view.

My Memory Isn’t What It Used to Be: Part 1

When analyzing malware, what you see on disk is oftentimes not an accurate representation of what’s actually happening in memory. Today’s malware has a unique way of hiding and likes to bend the rules...

View Article

Image may be NSFW.
Clik here to view.

Seven tips to keep your PC safe this summer

Whether you’re lost on a road trip, going deaf at a rock concert, or getting your sun tan on, odds are PC security isn’t the first thing on your mind as you enter this summer season. A fellow...

View Article


Image may be NSFW.
Clik here to view.

Electronic License Plates: A Better Alternative?

The electronic plate can receive updates with messages from the DMV, including if the car is stolen. The state of South Carolina is exploring new ideas for its license plates, and big changes may be...

View Article

Image may be NSFW.
Clik here to view.

First Official Xbox One Emulator Is a Phony

Gamer or not, you’ve likely heard about the next generation of video game consoles arriving later this year. However, you probably haven’t heard that fake emulators for the anticipated consoles are...

View Article


Image may be NSFW.
Clik here to view.

Buyer Beware: Steam Keys and What You Should Know

Back in 2003 when Valve released its now well-known game distribution software called Steam, I wasn’t immediately sold on the idea. I figured a gaming platform that imposed more restrictions on the...

View Article

Image may be NSFW.
Clik here to view.

New Android Vulnerability Affects 99% of Devices

Yesterday, Bluebox Security unveiled in a corporate blog post that their research team—dubbed Bluebox Labs—had uncovered a vulnerability that affects 99% of Android devices. The vulnerability has been...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Addresses Critical Vulnerabilities Tomorrow

Tomorrow on Patch Tuesday, Microsoft will be issuing security updates that address multiple vulnerabilities across several of its products. This information was provided by an advance notification of...

View Article
Browsing all 81 articles
Browse latest View live




Latest Images