Results for 'botnet'

Explained | News

Phishing 101: Part 2

July 3, 2012 - “Over the years, phishing attacks have changed, as with most things, and have been segmented into different groups of variants.” –Me...

CONTINUE READING
News | Threats

You Dirty RAT! Part 2 – BlackShades NET

June 15, 2012 - Last week we talked about the Remote Administration Trojan DarkComet and all the wonderful and scary things it can do.  In...

CONTINUE READING
News | Threats

You dirty RAT! Part 1: DarkComet

June 9, 2012 - Last week, I talked a little about the Flame Trojan and how much the average user would need to worry about...

CONTINUE READING
News | Threats

RATs of Unusual Sizes

June 1, 2012 - The flame malware has been referred to by some as “The most sophisticated malware to date” and while it is quite...

CONTINUE READING
Explained | News

Stopping malware distribution at the source

May 9, 2012 - At Malwarebytes we are a bit obsessed with protecting our users, which causes us to approach our jobs from all sorts...

CONTINUE READING
News | Threats

Anonymizing VM Traffic (Introduction)

April 24, 2012 - WARNING: The information included in this tutorial could be used for malicious purposes in the wrong hands, please expect to be...

CONTINUE READING