ALL POSTS Hacking Cars, Subverting Onboard Computers in Modern Vehicles Jean Taggart July 26, 2013 0 Comments There is a fascinating presentation scheduled at Defcon21, by Charlie Miller of Twitter and Chris Valasek of IOACTIVE in regards to… ZeroAccess uses Self-Debugging Joshua Cannell July 25, 2013 0 Comments Debuggers—a tool traditionally used to find errors (called “bugs”) in code—are also used by security experts. In the field of malware… Android Jelly Bean 4.3 Released, Gets Security Boost Joshua Cannell July 25, 2013 0 Comments Yesterday, Google unveiled the latest version of it’s renowned Android Operating System at an event in San Francisco. Labeled as a… Syrian Electronic Army Hacks Tango and Viber Servers Armando Orozco July 24, 2013 0 Comments Over the last few days two popular VOIP apps, Tango and Viber, had their servers breached that compromised customer data and… Enterprise Cyber Security Earns a Failing Grade Cecile Nguyen July 24, 2013 0 Comments News of companies getting hacked is becoming unnervingly common. Even Apple, the very image of being impregnable, is being hit. Apple… Vulnerability Bounty Hunting In Action Malwarebytes Labs July 23, 2013 0 Comments Last week, security researcher Roy Castillo posted a recount of interactions with Facebook about a bug that he had found. The bug allowed… How to encrypt your email Pieter Arntz July 23, 2013 0 Comments Given recent events and worries about data-leaks and other privacy issues, you might find it handy to have some tools to… Apple’s OS X FBI Ransomware Goes Global Jérôme Segura July 22, 2013 0 Comments Last week we blogged about how Apple’s Mac OS X users are vulnerable to the FBI Ransomware attacks. These social engineering… Bi-Directional Trickery, (╯°□°)╯︵ oןɹ Jean Taggart July 19, 2013 0 Comments Malware authors are known to try various obfuscation techniques in order to hide their malware. The Unicode Right-to-Left trick (RLO), which has… Previous 1 … 575 576 577 578 579 … 592 Next Contributors Threat Center Podcast Glossary Scams