ALL POSTS Malwarebytes @ DEFCON Adam Kujawa July 30, 2013 0 Comments This week is full of security conferences, with Black Hat already starting off, along with BSides LV and later this week,… How to encrypt files and folders Pieter Arntz July 29, 2013 0 Comments Encrypting files and folders is a way to protect them from unwanted access. Although modern Windows versions do have built-in options… Malwarebytes Adopts Aggressive PUP Policy Marcin Kleczynski July 26, 2013 0 Comments In the past, Malwarebytes Anti-Malware has detected only PUPs, or Potentially Unwanted Programs, that were mostly harmful and deceiving. Our… Hacking Cars, Subverting Onboard Computers in Modern Vehicles Jean Taggart July 26, 2013 0 Comments There is a fascinating presentation scheduled at Defcon21, by Charlie Miller of Twitter and Chris Valasek of IOACTIVE in regards to… ZeroAccess uses Self-Debugging Joshua Cannell July 25, 2013 0 Comments Debuggers—a tool traditionally used to find errors (called “bugs”) in code—are also used by security experts. In the field of malware… Android Jelly Bean 4.3 Released, Gets Security Boost Joshua Cannell July 25, 2013 0 Comments Yesterday, Google unveiled the latest version of it’s renowned Android Operating System at an event in San Francisco.Labeled as a “sweeter… Syrian Electronic Army Hacks Tango and Viber Servers Armando Orozco July 24, 2013 0 Comments Over the last few days two popular VOIP apps, Tango and Viber, had their servers breached that compromised customer data and… Enterprise Cyber Security Earns a Failing Grade Cecile Nguyen July 24, 2013 0 Comments News of companies getting hacked is becoming unnervingly common.Even Apple, the very image of being impregnable, is being hit. Apple confirmed… Vulnerability Bounty Hunting In Action Malwarebytes Labs July 23, 2013 0 Comments Last week, security researcher Roy Castillo posted a recount of interactions with Facebook about a bug that he had found. The bug allowed… Previous 1 … 600 601 602 603 604 … 617 Next Contributors Threat Center Podcast Glossary Scams