Petya ransomware is quickly becoming a household name and in typical cyber-criminal fashion, copycat families are starting to emerge. In this post, we have…
Month: June 2016
Analyzing baby ransomware
Ransomware is a serious threat we deal with everyday and a lot of our posts focus on analyzing the technical details…
419 scam combines lottery win and family foundation
A 419 scam is in circulation which combines lottery winners and a US-based foundation to trick people into handing over personal…
Neutrino EK: fingerprinting in a Flash
Since the disappearance of Angler EK, exploit kit activity is at one of its lowest it has been in a long…
Malwarebytes.org is now Malwarebytes.com
Over the last few weeks, you may have seen many of the assets on Malwarebytes.org transition to Malwarebytes.com. I’m here to…
Tech support scammer follow-up
This post is a sequel to Tech support scammers using Winlogon. As we have found after writing that post there are…
A week in security (Jun 19 – Jun 25)
Last week, we touched on Acer’s breach on their e-commerce site and explained what typosquatting is plus why it continues to…
Explained: typosquatting [updated]
Typosquatting is a term you may have seen when reading about Internet scams. In essence it relies on users making typing…
Malvertising and ransomware: the Bonnie and Clyde of advanced threats
A lot of folks in the business (and consumer) world are shaking in their boots about ransomware. It’s understandable. Ransomware is…
Malware uses Google Talk to make malicious phone calls
We found a new piece of mobile malware, Android/Trojan.Pawost, that’s using Google Talk to make malicious calls. As soon as the…