ALL POSTS SMS Scams: How To Defend Yourself Jérôme Segura July 30, 2013 0 Comments Who doesn’t own a mobile phone nowadays? Whether you have an old-school flip phone or a newer smartphone, you may already… Malwarebytes @ DEFCON Adam Kujawa July 30, 2013 0 Comments This week is full of security conferences, with Black Hat already starting off, along with BSides LV and later this week,… How to encrypt files and folders Pieter Arntz July 29, 2013 0 Comments Encrypting files and folders is a way to protect them from unwanted access. Although modern Windows versions do have built-in options… Malwarebytes Adopts Aggressive PUP Policy Marcin Kleczynski July 26, 2013 0 Comments In the past, Malwarebytes Anti-Malware has detected only PUPs, or Potentially Unwanted Programs, that were mostly harmful and deceiving. Our… Hacking Cars, Subverting Onboard Computers in Modern Vehicles Jean Taggart July 26, 2013 0 Comments There is a fascinating presentation scheduled at Defcon21, by Charlie Miller of Twitter and Chris Valasek of IOACTIVE in regards to… ZeroAccess uses Self-Debugging Joshua Cannell July 25, 2013 0 Comments Debuggers—a tool traditionally used to find errors (called “bugs”) in code—are also used by security experts. In the field of malware… Android Jelly Bean 4.3 Released, Gets Security Boost Joshua Cannell July 25, 2013 0 Comments Yesterday, Google unveiled the latest version of it’s renowned Android Operating System at an event in San Francisco. Labeled as a… Syrian Electronic Army Hacks Tango and Viber Servers Armando Orozco July 24, 2013 0 Comments Over the last few days two popular VOIP apps, Tango and Viber, had their servers breached that compromised customer data and… Enterprise Cyber Security Earns a Failing Grade Cecile Nguyen July 24, 2013 0 Comments News of companies getting hacked is becoming unnervingly common. Even Apple, the very image of being impregnable, is being hit. Apple… Previous 1 … 585 586 587 588 589 … 602 Next Contributors Threat Center Podcast Glossary Scams