ALL POSTS Vulnerability Bounty Hunting In Action Malwarebytes Labs July 23, 2013 0 Comments Last week, security researcher Roy Castillo posted a recount of interactions with Facebook about a bug that he had found. The bug allowed… How to encrypt your email Pieter Arntz July 23, 2013 0 Comments Given recent events and worries about data-leaks and other privacy issues, you might find it handy to have some tools to… Apple’s OS X FBI Ransomware Goes Global Jérôme Segura July 22, 2013 0 Comments Last week we blogged about how Apple’s Mac OS X users are vulnerable to the FBI Ransomware attacks. These social engineering… Bi-Directional Trickery, (╯°□°)╯︵ oןɹ Jean Taggart July 19, 2013 0 Comments Malware authors are known to try various obfuscation techniques in order to hide their malware. The Unicode Right-to-Left trick (RLO), which has… New App Fixes Bluebox Android Vulnerability, But Requires Root Joshua Cannell July 18, 2013 0 Comments A few weeks ago, we wrote about an Android master key flaw discovered by Bluebox Labs that allowed modification of APK… Tumblr Security Hole Reveals Passwords Armando Orozco July 17, 2013 0 Comments Tumblr released an update for their iOS apps after a recently discovered security hole first reported by The Register discovered by one… Q&A About The Latest HTML Ransomware Affecting Mac OS X users Jérôme Segura July 17, 2013 0 Comments The post I wrote about the FBI Ransomware Now Targeting Apple’s Mac OS X users has received a lot of attention. Perhaps it… FBI Ransomware Now Targeting Apple’s Mac OS X Users Jérôme Segura July 15, 2013 0 Comments For years, Windows users have been plagued by ransomware demanding several hundred dollars to unlock their computers. The bad guys know… Tile: Crowdsourcing Lost Keys Or Pseudo GPS Stalking On The Cheap? Jean Taggart July 12, 2013 0 Comments Tracking devices are not a new thing. You’ve seen them in film, where a secret agent (or Batman) bugs a criminal… Previous 1 … 586 587 588 589 590 … 602 Next Contributors Threat Center Podcast Glossary Scams