ALL POSTS Malwarebytes AV Compatibility Report Adam Kujawa August 13, 2013 0 Comments A rule of thumb for antivirus users has always been that you do not run two AVs at the same time,… Lock – Unlock, Biometrics Failure Jean Taggart August 13, 2013 0 Comments I like gadgets, no, scratch that, I LOVE gadgets. With this in mind, I very often find myself an early adopter… Do You Own A Website? Now Would Be A Good Time to Patch It Jérôme Segura August 12, 2013 0 Comments WordPress & Joomla! in the bull’s eye If you run your own website – but not Blogger and other free ones… More on Subverting Automotive Computing Systems Jean Taggart August 9, 2013 0 Comments Last week I attended Defcon21, where in addition to hanging out with my most excellent co-workers, I had the opportunity to… Linux Bank Trojan ‘Hand of Thief’ debuts Joshua Cannell August 8, 2013 0 Comments Sometimes it’s easy to forget that malware targets other Operating Systems besides Windows. However, it does exist, and is equally potent… DEFCON 21: An Odyssey Adam Kujawa August 7, 2013 0 Comments If you read my post last week about some of the Malwarebytes team heading out to Las Vegas for DEFCON 21… Chrome’s Stored Passwords Armando Orozco August 7, 2013 0 Comments An oddity in Google’s Chrome allows you to reveal stored passwords saved by the popular browser. Software developer Elliot Kember came… Firefox Zero-Day: A Quick Look At Yet Another Cross-Platform Vulnerability Jérôme Segura August 6, 2013 0 Comments We knew about Java’s “Write once, run everywhere” mantra which very quickly turned into jokes like “Write once, pwn everywhere”. But… The Malware Archives: PDF Files Joshua Cannell August 5, 2013 0 Comments Chances are you’ve probably used Adobe Reader before to read Portable Document Format (PDF) files. Adobe Reader—formerly Acrobat Reader—remains the number… Previous 1 … 579 580 581 582 583 … 598 Next Contributors Threat Center Podcast Glossary Scams