Malwarebiter – Biting down on you
UPDATE: As of 1/28, the Facebook page for Malwarebiter appears to have been deleted. Overview A few days ago Malwarebytes Intelligence Analyst Adam Kujawa released a Cyber-Threat Advisory on a fairly...
View ArticleTools of the Trade: Exploit Kits
Exploit Kits are a serious cyber threat today, estimated to be responsible for the vast percentage of malware infections worldwide. Exploit kits distributed currently through both public and...
View ArticleCTA: New Adobe Zero-Day
URGENT: A few days ago a new zero-day vulnerability in Adobe Reader had surfaced. Details below are on Adobe’s blog. ACTION: Unfortunately, a patch that fixes the issue is still in the works. In the...
View ArticleMalwarebytes and BSides San Francisco
For many years now, computer security conferences have been a common way for researchers, hackers, and security experts to meet and discuss the latest industry developments. In addition to the...
View ArticleCTA: New Java Zero-Days
Update: Oracle has addressed the exploit known as CVE-2013-1493 with an emergency patch. You can read about this patch on Oracle’s blog here. URGENT: A few days ago we heard about yet another...
View ArticleObfuscation: Malware’s best friend
Here at Malwarebytes, we see a lot of malware. Whether it’s a botnet used to attack web servers or a ransomware stealing your files, much of today’s malware wants to stay hidden during infection and...
View ArticleFrom Russia with Ransomware
This week the research team stumbled across a Russian ransomware sample so I decided to take a peek. The ransom message demands your money (in rubles, actually) and threatens to delete your data if...
View ArticleWho is ‘Whois’ ?
On March 20th, reports were circulating that a cyberattack had been conducted against broadcast networks and banks in South Korea. In typical reaction, it was suspected that North Korea may have been...
View ArticleMalware in a Jar
As researchers find more security flaws in Oracle Java, the software continues to be used for exploitation and malware delivery. This year has been a shaky start for the cross-platform web...
View ArticleToo Tough to Crack?
During the course of your life, there are many times when you have to prove who you are. Whether it’s applying for a loan, getting your driver’s license, or signing into your email account, a process...
View ArticleCTA: New Java Vulnerability
URGENT: Despite a recent critical patch to Java SE, Polish security firm Security Explorations released details of yet another Java vulnerability. Adam Gowdiak, a researcher from the firm provides a...
View ArticleNowhere to Hide: Three methods of XOR obfuscation
A couple of months ago, I did an article on generic obfuscation techniques used to hide malware. It continues to be no surprise that malware tries to hide using an array of techniques that are easy...
View ArticleBrazilian Facebook Trojan and Consumer Security
Recently a Microsoft blog was released describing a new Facebook Trojan classified as JS.Febipos.A by several AV vendors. Febipos is currently active in Brazil and takes control of your Facebook...
View ArticleMy Memory Isn’t What It Used to Be: Part 1
When analyzing malware, what you see on disk is oftentimes not an accurate representation of what’s actually happening in memory. Today’s malware has a unique way of hiding and likes to bend the rules...
View ArticleSeven tips to keep your PC safe this summer
Whether you’re lost on a road trip, going deaf at a rock concert, or getting your sun tan on, odds are PC security isn’t the first thing on your mind as you enter this summer season. A fellow...
View ArticleElectronic License Plates: A Better Alternative?
The electronic plate can receive updates with messages from the DMV, including if the car is stolen. The state of South Carolina is exploring new ideas for its license plates, and big changes may be...
View ArticleFirst Official Xbox One Emulator Is a Phony
Gamer or not, you’ve likely heard about the next generation of video game consoles arriving later this year. However, you probably haven’t heard that fake emulators for the anticipated consoles are...
View ArticleBuyer Beware: Steam Keys and What You Should Know
Back in 2003 when Valve released its now well-known game distribution software called Steam, I wasn’t immediately sold on the idea. I figured a gaming platform that imposed more restrictions on the...
View ArticleNew Android Vulnerability Affects 99% of Devices
Yesterday, Bluebox Security unveiled in a corporate blog post that their research team—dubbed Bluebox Labs—had uncovered a vulnerability that affects 99% of Android devices. The vulnerability has been...
View ArticleMicrosoft Addresses Critical Vulnerabilities Tomorrow
Tomorrow on Patch Tuesday, Microsoft will be issuing security updates that address multiple vulnerabilities across several of its products. This information was provided by an advance notification of...
View Article
More Pages to Explore .....