Fake shopper scam recruits money mules
One of the few criminal requirements that transcends time and the physical/cyber realm is the need for money mules, or a person who transfers money acquired illegally on the behalf of others. In the...
View ArticlePhishing is for the birds
One of the largest threats facing users today is from Phishing attacks, or social engineering attempts at getting the average person to click on a malicious link. The most common form of phishing comes...
View ArticlePhone Scammers Take A Move From The Ransomer’s Playbook
It didn’t seem too long ago everyone was aware of common scams, from Phone Scammers trying to sell you premium Microsoft support to Ransomers who claim to be from the FBI and lock down your desktop....
View ArticleChrome’s Solution to the Unsavvy Poses A Potential Risk
Don’t get me wrong, I love Chrome, I think it’s a fantastic browser and has a great track record of protecting users from exploits and malicious sites. However, their attempts at making it “easier”...
View ArticleScammers Pose as Anti-Virus, Go Figure
“Yup … you’ve got the hacker bug trojan virus, that’ll be $300″ The latest ruse put on by phone scammers is posing as the popular anti-virus AVG. In an article posted today by Eduard Kovacs @...
View ArticlePrepare … for Unpacked 2.0
For 18 months, Malwarebytes Unpacked has been bringing readers like you news about the latest cyber threats, in-depth analysis of malware and scams, and advice on keeping yourself safe online. We have...
View ArticleBitcoins, Pools and Thieves
Bitcoin started out as a digital currency, free from duplication and free from centralization and assumed, free from organized crime. However over the last couple weeks, there have been two major...
View ArticleTracking the Locker
If you are reading this blog, chances are that you have been bombarded with news and information about the infamous, Cryptolocker for months now. However, for a threat THIS dangerous, it’s important...
View ArticlePotentially Unwanted Miners – Toolbar Peddlers Use Your System To Make BTC
Potentially Unwanted Programs or PUPs as we like to call them, are things like Toolbars, Search Agents, etc. Unnecessary junk for your desktop that usually involves monitoring your surfing/shopping...
View ArticleYelling Across the Gap
In an article posted today by Mohit Kumar of the Hacker News, a proof of concept was reported that proves the technology exists for malware to actually communicate between non-connected systems via...
View ArticleMalwarebytes 2013 Threat Report
The past year turned out to be an interesting introduction into the new types of threats users are facing as well as what they will continue to face, at greater levels, in the coming years. We have...
View ArticlePaperghost is now Haunting Malwarebytes!
At Malwarebytes, we do our best to gather the most talented and creative malware researchers we can in order to better fight the unending sea of malware and other online threats. Our newest edition to...
View ArticleMiner Madness!
Over the past few weeks, I am certain that you have heard your fair share about Bitcoin and not just from us but from news outlets and probably in passing conversation. Today’s news is all about how...
View ArticleBug Bounties and the Price of Security
In a recent article on the NSS Security blog, Stefan Frei discusses a potential standard for bug bounty programs and how it could help secure targeted applications and still be economically sound....
View ArticleGive a Doge a Coin
Well, it’s happened. The internet is just a few steps away from becoming a sentient being, given life and value by those of us who worship it as our source of commerce, communication and entertainment....
View ArticleEncryption is Loud and the Walls Have Ears
Seems like the interest in computer communication via sound is taking another peak in interest now that researchers discovered a way to decrypt RSA-4096 encryption just by listening. In the white paper...
View ArticleMalicious Acquisition vs Moral Development
As much as we want to imagine the cybercrime underground as a dark alley full of sneaky types dressed in ski masks and gloves, the reality is that in many cases, it’s comprised of highly organized...
View ArticleFBI Takes Down Poorly Secured Carders
Operational Security, or OPSEC, is the very core of running any kind of clandestine operations, be it a government or a criminal organization. When you fail to secure OPSEC, you are doomed to lose...
View ArticleBieber Arrest Leads to Survey Scam
It’s been all over the news, Justin Bieber’s arrested for racing under the influence. Fans all over the world cry out in support of the #FreeBieber movement and scammers are finding a prime opportunity...
View ArticleWhat the future of purchasing might look like
Over the last couple of months, we’ve heard a lot about a huge attack at Target stores where thousands of credit card numbers had been stolen. The attack was pulled off by a strain of malware located...
View Article