Results for 'microsoft'

Exploits and vulnerabilities | News | Threats

Citadel: a cyber-criminal’s ultimate weapon?

November 5, 2012 - In old times, a citadel was a fortress used as the last line of defense. For cyber criminals it is a...

CONTINUE READING
Explained | News

How to Give Malwarebytes Anti-Malware The Power!

September 28, 2012 - Many PC users are content to let their hardware and software become outdated and obsolete if only because it still runs,...

CONTINUE READING
Explained | News

Much Ado About Browser Malware

September 24, 2012 - Browser Malware is a constant problem for all computer users. In addition to being highly intrusive and sometimes difficult to remove,...

CONTINUE READING
News

Malwarebytes @ DefCon: The Wrap-Up

July 30, 2012 - As mentioned last week, the Malwarebytes crew made it out to DefCon this year to check out all of the interesting...

CONTINUE READING
Cybercrime | News

The Malware That I Used To Know

July 25, 2012 - Malware, much like all weapons, evolve based upon multiple factors, be it the protections of their intended target, the weapon operator...

CONTINUE READING
News | Threats

You dirty RAT! Part 1: DarkComet

June 9, 2012 - Last week, I talked a little about the Flame Trojan and how much the average user would need to worry about...

CONTINUE READING
News | Threats

RATs of Unusual Sizes

June 1, 2012 - The flame malware has been referred to by some as “The most sophisticated malware to date” and while it is quite...

CONTINUE READING
Explained | News

Telephony Scams: Can You Help?

May 24, 2012 - Back in 2009, I wrote about a telephony based scam that had gained momentum, and which sadly appears to have grown...

CONTINUE READING
Cybercrime | News

Intentional PE Corruption

April 30, 2012 - Malwarebytes Anti-Malware is under constant attack. 24 hours per day, 7 days per week, 365 days per year. If you read...

CONTINUE READING
News | Threats

Anonymizing Traffic For Your VM

April 27, 2012 - Security Level: Medium Purpose: To hide who you are while performing research through your browser AND protecting your host system from...

CONTINUE READING