Results for 'bots'

Cybercrime | News

Gmail Security Flaw Allows for Password Theft

November 22, 2013 - Security researcher Oren Hafif recently uncovered a vulnerability that tricks Gmail users into giving away their passwords. Walking through the Account...

CONTINUE READING
Cybercrime | News

Ransomware Puts Your System To Work Mining Bitcoins

September 18, 2013 - The Ransomware family ‘Reveton’ has been a thorn in the sides of many for over two years. It has employed a...

CONTINUE READING
Cybercrime | News

Linux Bank Trojan ‘Hand of Thief’ debuts

August 8, 2013 - Sometimes it’s easy to forget that malware targets other Operating Systems besides Windows. However, it does exist, and is equally potent...

CONTINUE READING
News

DEFCON 21: An Odyssey

August 7, 2013 - If you read my post last week about some of the Malwarebytes team heading out to Las Vegas for DEFCON 21...

CONTINUE READING
Cybercrime | News

What are Trojans?

June 4, 2013 - A Trojan (horse) in computer-terms is a type of malware that does not replicate itself. The name is based on the...

CONTINUE READING
Cybercrime | News

Malwarebytes Hit by Targeted Attack!

April 1, 2013 - Dear Readers, We regret to inform you that over the weekend, Malwarebytes was under direct, targeted attack from a new type...

CONTINUE READING
Cybercrime | News | Scams

Malwarebiter – Biting down on you

January 30, 2013 - UPDATE: As of 1/28, the Facebook page for Malwarebiter appears to have been deleted. Overview A few days ago Malwarebytes Intelligence Analyst...

CONTINUE READING
Exploits and vulnerabilities | News | Threats

Citadel: a cyber-criminal’s ultimate weapon?

November 5, 2012 - In old times, a citadel was a fortress used as the last line of defense. For cyber criminals it is a...

CONTINUE READING
Cybercrime | News

The Malware That I Used To Know

July 25, 2012 - Malware, much like all weapons, evolve based upon multiple factors, be it the protections of their intended target, the weapon operator...

CONTINUE READING
Explained | News

Phishing 101: Part 2

July 3, 2012 - “Over the years, phishing attacks have changed, as with most things, and have been segmented into different groups of variants.” –Me...

CONTINUE READING