I am thrilled to announce the launch of our next-generation product, Malwarebytes 3.0! This product is built to provide comprehensive protection…
Tag: malware
Simple userland rootkit – a case study
Rootkits are tools and techniques used to hide (potentially malicious) modules from being noticed by system monitoring. Many people, hearing the…
Malware taking advantage of Android OS exploits, again: Gooligan
From what we can gather from Check Point’s blog post, Gooligan is an already well-known threat with a new name hinted…
Mobile Menace Monday: Adups, old and new
A newly discovered malicious app is found on China-made mobile devices running the Android OS. This is a baked-in system app…
Video found freezing Apple devices
That’s right, freezing apples, and we aren’t talking about a frost warning at your local apple orchard. A video has been…
An overview of malvertising on the Mac
Most people associate malvertising with malware and the Windows platform. Indeed, the vast majority (and most damaging) attacks that happen thanks…
TeleCrypt – the ransomware abusing Telegram API – defeated!
A new ransomware, TeleCrypt appeared recently carrying some new ideas. While most ransomware communicates with their C&C over simple HTTP-based protocols,…
Floki Bot and the stealthy dropper
Floki Bot, described recently by Dr. Peter Stephenson from SC Magazine, is yet another bot based on the leaked Zeus code. However,…
Ransomware doesn’t mean game over
Let’s face it. We live in a completely different security world from a decade ago and the kinds of threats we…
Mobile Menace Monday: How dare that rootin’ Dirty COW
If you follow cybersecurity news, you may have heard of the latest Linux exploit referenced under CVE-2016-5195, which has been dubbed…