Results for 'exploit kit'
With the latest NSA allegations, can we still trust encryption?
September 9, 2013 - The New York Times and the Guardian published news stories last week alleging that the National Security Agency (NSA) spent billions of...
Jekyll App Sneaks into Apple’s App Store
August 23, 2013 - Apple, for the most part, has been able to escape the wrath of malware authors compared with its main competitor, Android. When...
A Guide to Website Security
June 17, 2013 - Having your own website is hard enough. In addition to adding content, trying to grow your audience, maintaining it, now you...
ATM and Point-of-Sale Terminals Malware: The Bad Guys Just Never Stop!
May 27, 2013 - If you use your debit or credit card to buy groceries or get cash out of an ATM you might want...
Malware in a Jar
April 3, 2013 - As researchers find more security flaws in Oracle Java, the software continues to be used for exploitation and malware delivery. This...
From server hack to client side ransomware
November 19, 2012 - Insecure websites are responsible for most malware infections. In this post I will show you how a typical WordPress site that...
Citadel: a cyber-criminal’s ultimate weapon?
November 5, 2012 - In old times, a citadel was a fortress used as the last line of defense. For cyber criminals it is a...
DefCon for Developers
August 8, 2012 - My colleague Adam Kujawa recently wrote a great post about the Malwarebytes experience at the hacker convention DefCon this year. By...
Malwarebytes @ DefCon: The Wrap-Up
July 30, 2012 - As mentioned last week, the Malwarebytes crew made it out to DefCon this year to check out all of the interesting...
You dirty RAT! Part 1: DarkComet
June 9, 2012 - Last week, I talked a little about the Flame Trojan and how much the average user would need to worry about...