ALL POSTS Firefox Zero-Day: A Quick Look At Yet Another Cross-Platform Vulnerability Jérôme Segura August 6, 2013 0 Comments We knew about Java’s “Write once, run everywhere” mantra which very quickly turned into jokes like “Write once, pwn everywhere”. But… The Malware Archives: PDF Files Joshua Cannell August 5, 2013 0 Comments Chances are you’ve probably used Adobe Reader before to read Portable Document Format (PDF) files. Adobe Reader—formerly Acrobat Reader—remains the number… Firefox Zero-Day Used to Reveal Identities: Does The End Justify The Means? Jérôme Segura August 5, 2013 0 Comments An Exploit for Mozilla’s Firefox version 17 is making headlines, not simply because it is a zero-day but mainly because it… Fake Pharma, Malware Target Pinterest Jérôme Segura August 3, 2013 0 Comments Pinterest is a really cool service where you can literally spend hours finding the most amazing ideas in a friendlier and… Sophos Discovers ZeroAccess Using RLO Joshua Cannell August 1, 2013 0 Comments Yesterday, analysts at SophosLabs looked at a new ZeroAccess variant using some new tricks to hide itself.Or should I say old… Android as a Service, “Verify Apps” for Gingerbread and Up Armando Orozco July 31, 2013 0 Comments However, what’s most interesting to me are the updates to Google Play Services and how it could impact the Android ecosystem… SMS Scams: How To Defend Yourself Jérôme Segura July 30, 2013 0 Comments Who doesn’t own a mobile phone nowadays? Whether you have an old-school flip phone or a newer smartphone, you may already… Malwarebytes @ DEFCON Adam Kujawa July 30, 2013 0 Comments This week is full of security conferences, with Black Hat already starting off, along with BSides LV and later this week,… How to encrypt files and folders Pieter Arntz July 29, 2013 0 Comments Encrypting files and folders is a way to protect them from unwanted access. Although modern Windows versions do have built-in options… Previous 1 … 599 600 601 602 603 … 617 Next Contributors Threat Center Podcast Glossary Scams