In this blog post, we are going to take a closer look at some of the code that the most predominant…
Month: December 2016
Ransomware tries its hand at being a deadly viral meme
Memes are weird things and weren’t always about lolcats or frogs or whatever the latest terrible image macro doing the rounds…
A week in security (Dec 04 – Dec 10)
Last week we launched Malwarebytes 3.0, our next-generation antivirus replacement. We also touched on domain generating algorithms (DGA), went up-close and…
Announcing Malwarebytes 3.0, a next-generation antivirus replacement
I am thrilled to announce the launch of our next-generation product, Malwarebytes 3.0! This product is built to provide comprehensive protection…
Simple userland rootkit – a case study
Rootkits are tools and techniques used to hide (potentially malicious) modules from being noticed by system monitoring. Many people, hearing the…
Explained: Domain Generating Algorithm
A Domain Generating Algorithm (DGA) is a program or subroutine that provides malware with new domains on demand or on the…
AdGholas malvertising: business as usual
The largest malvertising attacks are the ones you seldom hear about. A group identified as AdGholas by Proofpoint which has been…
Fake Forbes story becomes bearer of “smart drug” news
First, we had fake online Canadian pharmacies, and then fake diet supplements. Now, we have fake brain enhancers. Stephen Hawking Predicts, “This…
A week in security (Nov 27 – Dec 03)
Last week, we commented on Gooligan, homed in on a fake WhatsApp phishing email, and discussed about a rogue Chrome extension…
Malware taking advantage of Android OS exploits, again: Gooligan
From what we can gather from Check Point’s blog post, Gooligan is an already well-known threat with a new name hinted…