Quantcast
Channel: Adam Kujawa – Malwarebytes Labs
Browsing all 98 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Fake shopper scam recruits money mules

One of the few criminal requirements that transcends time and the physical/cyber realm is the need for money mules, or a person who transfers money acquired illegally on the behalf of others. In the...

View Article


Image may be NSFW.
Clik here to view.

Phishing is for the birds

One of the largest threats facing users today is from Phishing attacks, or social engineering attempts at getting the average person to click on a malicious link. The most common form of phishing comes...

View Article


Image may be NSFW.
Clik here to view.

Phone Scammers Take A Move From The Ransomer’s Playbook

It didn’t seem too long ago everyone was aware of common scams, from Phone Scammers trying to sell you premium Microsoft support to Ransomers who claim to be from the FBI and lock down your desktop....

View Article

Image may be NSFW.
Clik here to view.

Chrome’s Solution to the Unsavvy Poses A Potential Risk

Don’t get me wrong, I love Chrome, I think it’s a fantastic browser and has a great track record of protecting users from exploits and malicious sites.  However, their attempts at making it “easier”...

View Article

Image may be NSFW.
Clik here to view.

Scammers Pose as Anti-Virus, Go Figure

“Yup … you’ve got the hacker bug trojan virus, that’ll be $300″ The latest ruse put on by phone scammers is posing as the popular anti-virus AVG. In an article posted today by Eduard Kovacs @...

View Article


Image may be NSFW.
Clik here to view.

Prepare … for Unpacked 2.0

For 18 months, Malwarebytes Unpacked has been bringing readers like you news about the latest cyber threats, in-depth analysis of malware and scams, and advice on keeping yourself safe online. We have...

View Article

Image may be NSFW.
Clik here to view.

Bitcoins, Pools and Thieves

Bitcoin started out as a digital currency, free from duplication and free from centralization and assumed, free from organized crime. However over the last couple weeks, there have been two major...

View Article

Image may be NSFW.
Clik here to view.

Tracking the Locker

If you are reading this blog, chances are that you have been bombarded with news and information about the infamous, Cryptolocker for months now.  However, for a threat THIS dangerous, it’s important...

View Article


Image may be NSFW.
Clik here to view.

Potentially Unwanted Miners – Toolbar Peddlers Use Your System To Make BTC

Potentially Unwanted Programs or PUPs as we like to call them, are things like Toolbars, Search Agents, etc. Unnecessary junk for your desktop that usually involves monitoring your surfing/shopping...

View Article


Image may be NSFW.
Clik here to view.

Yelling Across the Gap

In an article posted today by Mohit Kumar of the Hacker News, a proof of concept was reported that proves the technology exists for malware to actually communicate between non-connected systems via...

View Article

Image may be NSFW.
Clik here to view.

Malwarebytes 2013 Threat Report

The past year turned out to be an interesting introduction into the new types of threats users are facing as well as what they will continue to face, at greater levels, in the coming years. We have...

View Article

Paperghost is now Haunting Malwarebytes!

At Malwarebytes, we do our best to gather the most talented and creative malware researchers we can in order to better fight the unending sea of malware and other online threats. Our newest edition to...

View Article

Image may be NSFW.
Clik here to view.

Miner Madness!

Over the past few weeks, I am certain that you have heard your fair share about Bitcoin and not just from us but from news outlets and probably in passing conversation. Today’s news is all about how...

View Article


Bug Bounties and the Price of Security

In a recent article on the NSS Security blog, Stefan Frei discusses a potential standard for bug bounty programs and how it could help secure targeted applications and still be economically sound....

View Article

Image may be NSFW.
Clik here to view.

Give a Doge a Coin

Well, it’s happened. The internet is just a few steps away from becoming a sentient being, given life and value by those of us who worship it as our source of commerce, communication and entertainment....

View Article


Image may be NSFW.
Clik here to view.

Encryption is Loud and the Walls Have Ears

Seems like the interest in computer communication via sound is taking another peak in interest now that researchers discovered a way to decrypt RSA-4096 encryption just by listening. In the white paper...

View Article

Image may be NSFW.
Clik here to view.

Malicious Acquisition vs Moral Development

As much as we want to imagine the cybercrime underground as a dark alley full of sneaky types dressed in ski masks and gloves, the reality is that in many cases, it’s comprised of highly organized...

View Article


Image may be NSFW.
Clik here to view.

FBI Takes Down Poorly Secured Carders

Operational Security, or OPSEC, is the very core of running any kind of clandestine operations, be it a government or a criminal organization.  When you fail to secure OPSEC, you are doomed to lose...

View Article

Image may be NSFW.
Clik here to view.

Bieber Arrest Leads to Survey Scam

It’s been all over the news, Justin Bieber’s arrested for racing under the influence. Fans all over the world cry out in support of the #FreeBieber movement and scammers are finding a prime opportunity...

View Article

Image may be NSFW.
Clik here to view.

What the future of purchasing might look like

Over the last couple of months, we’ve heard a lot about a huge attack at Target stores where thousands of credit card numbers had been stolen. The attack was pulled off by a strain of malware located...

View Article
Browsing all 98 articles
Browse latest View live