Results for 'microsoft'
Citadel: a cyber-criminal’s ultimate weapon?
November 5, 2012 - In old times, a citadel was a fortress used as the last line of defense. For cyber criminals it is a...
How to Give Malwarebytes Anti-Malware The Power!
September 28, 2012 - Many PC users are content to let their hardware and software become outdated and obsolete if only because it still runs,...
Much Ado About Browser Malware
September 24, 2012 - Browser Malware is a constant problem for all computer users. In addition to being highly intrusive and sometimes difficult to remove,...
Malwarebytes @ DefCon: The Wrap-Up
July 30, 2012 - As mentioned last week, the Malwarebytes crew made it out to DefCon this year to check out all of the interesting...
The Malware That I Used To Know
July 25, 2012 - Malware, much like all weapons, evolve based upon multiple factors, be it the protections of their intended target, the weapon operator...
You dirty RAT! Part 1: DarkComet
June 9, 2012 - Last week, I talked a little about the Flame Trojan and how much the average user would need to worry about...
RATs of Unusual Sizes
June 1, 2012 - The flame malware has been referred to by some as “The most sophisticated malware to date” and while it is quite...
Telephony Scams: Can You Help?
May 24, 2012 - Back in 2009, I wrote about a telephony based scam that had gained momentum, and which sadly appears to have grown...
Intentional PE Corruption
April 30, 2012 - Malwarebytes Anti-Malware is under constant attack. 24 hours per day, 7 days per week, 365 days per year. If you read...
Anonymizing Traffic For Your VM
April 27, 2012 - Security Level: Medium Purpose: To hide who you are while performing research through your browser AND protecting your host system from...