ALL POSTS Lock – Unlock, Biometrics Failure Jean Taggart August 13, 2013 0 Comments I like gadgets, no, scratch that, I LOVE gadgets. With this in mind, I very often find myself an early adopter… Do You Own A Website? Now Would Be A Good Time to Patch It Jérôme Segura August 12, 2013 0 Comments WordPress & Joomla! in the bull’s eye If you run your own website – but not Blogger and other free ones… More on Subverting Automotive Computing Systems Jean Taggart August 9, 2013 0 Comments Last week I attended Defcon21, where in addition to hanging out with my most excellent co-workers, I had the opportunity to… Linux Bank Trojan ‘Hand of Thief’ debuts Joshua Cannell August 8, 2013 0 Comments Sometimes it’s easy to forget that malware targets other Operating Systems besides Windows. However, it does exist, and is equally potent… DEFCON 21: An Odyssey Adam Kujawa August 7, 2013 0 Comments If you read my post last week about some of the Malwarebytes team heading out to Las Vegas for DEFCON 21… Chrome’s Stored Passwords Armando Orozco August 7, 2013 0 Comments An oddity in Google’s Chrome allows you to reveal stored passwords saved by the popular browser. Software developer Elliot Kember came… Firefox Zero-Day: A Quick Look At Yet Another Cross-Platform Vulnerability Jérôme Segura August 6, 2013 0 Comments We knew about Java’s “Write once, run everywhere” mantra which very quickly turned into jokes like “Write once, pwn everywhere”. But… The Malware Archives: PDF Files Joshua Cannell August 5, 2013 0 Comments Chances are you’ve probably used Adobe Reader before to read Portable Document Format (PDF) files. Adobe Reader—formerly Acrobat Reader—remains the number… Firefox Zero-Day Used to Reveal Identities: Does The End Justify The Means? Jérôme Segura August 5, 2013 0 Comments An Exploit for Mozilla’s Firefox version 17 is making headlines, not simply because it is a zero-day but mainly because it… Previous 1 … 572 573 574 575 576 … 590 Next Contributors Threat Center Podcast Glossary Scams