ALL POSTS Fake Pharma, Malware Target Pinterest Jérôme Segura August 3, 2013 0 Comments Pinterest is a really cool service where you can literally spend hours finding the most amazing ideas in a friendlier and… Sophos Discovers ZeroAccess Using RLO Joshua Cannell August 1, 2013 0 Comments Yesterday, analysts at SophosLabs looked at a new ZeroAccess variant using some new tricks to hide itself. Or should I say… Android as a Service, “Verify Apps” for Gingerbread and Up Armando Orozco July 31, 2013 0 Comments However, what’s most interesting to me are the updates to Google Play Services and how it could impact the Android ecosystem… SMS Scams: How To Defend Yourself Jérôme Segura July 30, 2013 0 Comments Who doesn’t own a mobile phone nowadays? Whether you have an old-school flip phone or a newer smartphone, you may already… Malwarebytes @ DEFCON Adam Kujawa July 30, 2013 0 Comments This week is full of security conferences, with Black Hat already starting off, along with BSides LV and later this week,… How to encrypt files and folders Pieter Arntz July 29, 2013 0 Comments Encrypting files and folders is a way to protect them from unwanted access. Although modern Windows versions do have built-in options… Malwarebytes Adopts Aggressive PUP Policy Marcin Kleczynski July 26, 2013 0 Comments In the past, Malwarebytes Anti-Malware has detected only PUPs, or Potentially Unwanted Programs, that were mostly harmful and deceiving. Our… Hacking Cars, Subverting Onboard Computers in Modern Vehicles Jean Taggart July 26, 2013 0 Comments There is a fascinating presentation scheduled at Defcon21, by Charlie Miller of Twitter and Chris Valasek of IOACTIVE in regards to… ZeroAccess uses Self-Debugging Joshua Cannell July 25, 2013 0 Comments Debuggers—a tool traditionally used to find errors (called “bugs”) in code—are also used by security experts. In the field of malware… Previous 1 … 573 574 575 576 577 … 590 Next Contributors Threat Center Podcast Glossary Scams