Lately, there has been quite a bit of talk about how Facebook Messenger for Android has an abundance of permissions, permissions…
Month: September 2014
Fileless Infections from Exploit Kit: An Overview
The exploit kit landscape is constantly changing and forcing security researchers to up their game. There was a time when payloads…
Tech Support Scams exposed at VB2014
I had the honour of presenting my research on tech support scams at the VB2014 conference in Seattle. Since I received the…
New bash bug could wreak havoc on Linux and OS X systems
Update (12:34 PM): Web security firm Sucuri has already detected in the wild attempts to load remote shells onto servers using…
Imitation Softpedia Site Offers Up A PUP
You may well be familiar with Softpedia, which is a huge library of downloadable software and breaking news stories. We recently noticed a Softpedia…
The Tyra Banks Social Media Mystery
At a time when celebrities are having their cloud storage accounts compromised and personal photographs uploaded for the World to see, many…
Viator(dot)com Data Compromise: Are You Affected?
You may well be seeing an email appearing in your inbox from Viator.com, a website designed to help you find tours and…
‘Flash EK’ skips landing page, goes Flash all the way
We came across a strange new exploitation pattern recently where the payload appeared to be distributed without going through the typical process….
A Week in Security (Sept 14 – 20)
Here’s a review of last week’s posts on Malwarebytes Unpacked: Top news stories: Stay safe! The Malwarebytes Labs Team
Meet the Master Boot Record
What does MBR stand for? MBR is short for Master Boot Record. Typically, the MBR is the first sector on a…