SUBSCRIBE rss ALL POSTS CTA: Malwarebiter.com Adam Kujawa January 25, 2013 0 Comments URGENT: Malwarebytes mimic site ‘ Malwarebiter(dot)com’ hosts fake anti-malware product and spreads malware. ACTION: Do NOT visit ‘ Malwarebiter(dot)com ‘ unless… Cyber Threats in 2012: Looking Both Ways Adam Kujawa January 21, 2013 0 Comments 2012 was a dangerous year, packed with threats such as Drive-by exploits, Ransomware, phishing scams and state-sponsored malware. Those who payed… Zero-Day Java vulnerability wreaks havoc on computers worldwide Jérôme Segura January 14, 2013 0 Comments Update (1/14/2013) Oracle has issued an emergency patch to be shipped with version 7 update 11. While we are pleased to see a… CTA: Unpatched Java Exploit in the Wild Adam Kujawa January 10, 2013 0 Comments URGENT: New Java Exploit being used to infect Updated Users. ACTION: Disable Java Browser Plugin using: DETAILS: As of yesterday, a… Web Exploits: a bright future ahead Jérôme Segura January 2, 2013 0 Comments The majority of computers get infected from visiting a specially crafted webpage that exploits one or multiple software vulnerabilities. It could… Misleading advertising Steven Burn December 20, 2012 0 Comments Today we are going to be talking about advertising, specifically misleading advertising. Whether it’s on TV or on the internet, in… This Christmas time the bad guys will be shopping too Jérôme Segura December 17, 2012 0 Comments While most folks want a new gaming system, TV, or the latest computer gadget, there is another group of people that… Chameleon: One Year Later Adam Kujawa December 14, 2012 0 Comments About one year ago, Malwarebytes gained a new weapon in the fight against cyber-crime to accomplish things it had not been… Ransomware Adam Kujawa December 7, 2012 0 Comments …because some malware is too heinous for clever puns. Ransom software or Ransomware, takes advantage of our constant need for information,… Previous 1 … 532 533 534 535 536 … 539 Next Contributors Threat Center Podcast Glossary Scams