ALL POSTS Law Against Cookies Pieter Arntz February 20, 2013 0 Comments In May 2011 the European Union changed the law that covers the use of electronic communications networks to store information, e.g…. Malwarebytes and BSides San Francisco Joshua Cannell February 18, 2013 0 Comments For many years now, computer security conferences have been a common way for researchers, hackers, and security experts to meet and… Q&A about ransomware featuring Eric Freyssinet Jérôme Segura February 15, 2013 0 Comments This week I am talking with Eric Freyssinet, head of a national cybercrime investigative unit in France. We discuss ransomware and… CTA: New Adobe Zero-Day Joshua Cannell February 14, 2013 0 Comments URGENT: A few days ago a new zero-day vulnerability in Adobe Reader had surfaced. Details below are on Adobe’s blog. Text Popups Pieter Arntz February 13, 2013 0 Comments What is a text popup? A text popup is a link that opens a popup box containing advertisements, usually prompted by… Tools of the Trade: Exploit Kits Joshua Cannell February 11, 2013 0 Comments Exploit Kits are a serious cyber threat today, estimated to be responsible for the vast percentage of malware infections worldwide. Exploit… Sandbox Sensitivity Pieter Arntz February 5, 2013 0 Comments This article is meant to give you an overview of how sandboxes are used and why malware writers try to avoid… Digital certificates and malware: a dangerous mix Jérôme Segura February 4, 2013 0 Comments Update (Feb 6th): The digital certificates have been revoked by DigiCert. Update (Feb 4th, 3:44 PM): Egnyte has promptly taken down the… Malwarebiter – Biting down on you Joshua Cannell January 30, 2013 0 Comments UPDATE: As of 1/28, the Facebook page for Malwarebiter appears to have been deleted. Overview A few days ago Malwarebytes Intelligence Analyst… Previous 1 … 585 586 587 588 589 … 593 Next Contributors Threat Center Podcast Glossary Scams