GFI Releases Report on 2013 Vulnerabilities
The best way to predict security trends in the oncoming year is to look back and see what went wrong in the previous years. To that end, GFI labs released a report today on the most vulnerable...
View ArticleEsurance Giveaway Brings Out The Worst In Scammers
Sunday night, right after the Superbowl ended, the very first commercial was from Esurance, the insurance company, advertising a $1.5 Million giveaway for all the money they saved by not buying air...
View ArticleMalwarebytes Now Accepts Bitcoins!
Over the last year, there have been massive amounts of news stories for and against Bitcoin being used as a currency. Here at Malwarebytes we have been advocates for the principles that lent to its...
View ArticleBitcoin Theft in the Underground
This week, news came out that Silk Road 2, the underground marketplace specializing in nefarious services, had all of its Bitcoins stolen. At least that is what the SR2 staff claims. The news broke on...
View ArticleAndroid Botnets Hop on the TOR Train
Botnet creators have attempted numerous tactics for hiding their presence, traffic and locations of their command and control (CnC) servers. To this end, we have seen the development of such things as...
View ArticleBitcoin Trouble on the Open Express
There has been tons of different stories documenting the various crimes being committed against Bitcoin users, exchanges and marketplaces; but why do they keep happening? Well, part of the answer lies...
View ArticleMalicious Messages Foray Facebook
In yet another method for cyber criminals to utilize the world’s most popular social networks for their own nefarious purposes, it appears a trojan is circulating through Facebook, stealing accounts...
View ArticlePrepare to Surf the Wave of Updates
If you are like most people who use their computers in what I will refer to as “the modern fashion,” or just letting it go to sleep without actually restarting and using a single browser window with...
View ArticleScammer Network Recruits Penniless Gamer Army
When I was a teenager, you based your social status on the clothes you wore , the music you listened to or the toys you had (I thought the Tamagotchi was cool) and as a new generation has taken over,...
View Article25 Years and our computers are still…
Today, Ars Technica posted an article looking back 25 years ago to when the Nintendo Game Boy was first released. I thought it was a nice nostalgic nod to the days past. The article inspired me to do...
View ArticleSideloading Apps is a Dangerous Game
This post covers my adventures in trying to get a game I really like and have already paid for on the Desktop, to run on my unsupported tablet. In the process, I spend many hours banging my head...
View ArticlePaypal Phishing Flood UPDATED
Our researchers recently noticed a trend in phishing scams over the last week, namely that a specific style of PayPal phish e-mail has been flooding potential victims. The text of the phishing e-mail...
View ArticleA RAT in Bird’s clothing
Some folks worry when they get a malicious e-mail, Facebook update or Tweet from some untrusted account with a suspicious link attached to it, I get excited! Yesterday, I was doing my rounds on Social...
View ArticleTaking off the Blackshades
About two years ago, I wrote a series of blog posts that covered a particular Remote Access Trojan (RAT) known as Blackshades. The posts covered how Blackshades was used against Syrian rebels, how the...
View ArticleEncountering the Wild PUP
The Internet is full of dangers; threats like malware, phishing attacks, hackers and drive-by exploits are some of the most commonly mentioned. But did you know that there is a far more common threat...
View ArticleNo More Poweliks!
Poweliks is an infection that runs without a filesystem object, completely from the registry and memory using rundll32.exe, javascript and a create on-the-fly dll in memory. Starting now, we can remove...
View Article100 Cites in 100 Days Starts Today!
Today, to coincide with Data Privacy Day, we wanted to let you know about a new computer security initiative called “100 Cities in 100 Days”. The Identify Theft Council created this project to persuade...
View ArticleBSides Austin 2015 and Malware Analysis Training
Hey Folks! I attended the BSides Austin 2015 conference this week and gave a talk about the basics of malware analysis called “Malware Analysis 101.” I had a lot of great feedback from people about the...
View ArticleDell System Detect Vulnerability now classified as a PUP
As of last night, Malwarebytes started detecting a very popular and very vulnerable application as a PUP. This application, known as Dell System Detect, is pre-installed with many Dell systems....
View ArticleUPDATE NOW: Critical Patch Pushed by Microsoft
Hey Folks, We wanted to let you know that Microsoft has pushed out a new update in the last 24 hours. Usually updates are held off until “Patch Tuesday” but the severity of the vulnerability they are...
View Article