Malwarebytes on Inc. 5000October 9, 2015 Read More
Boo! It’s cybersecurity monthOctober 9, 2015
Adam Kujawa, head of Malware Intelligence at Malwarebytes Labs, suggests at a minimum each of us should take three simple steps to reduce our exposure to cyber theft:
“First of all, utilizing different passwords for different sites is important,” he said. “Since break-ins are ineluctable, using different passwords will limit the damage to a single service, such as a store credit card, rather than all to all of your financial accounts.”Read More
Porn.com Drops Flash as Web’s Least-Loved Tech Nears DeathOctober 8, 2015
“Every piece of software has vulnerabilities. But the main mode of attack now is the browser and plugins within that browser,” says Jérôme Segura, a senior researcher with security outfit Malwarebytes. “The past couple of years, that’s been all about Flash.”Read More
5 enterprise take-aways on Apple OS X El CapitanOctober 2, 2015
Thomas Reed, Director of Mac Offerings, Malwarebytes, said:
‘The main change is the addition of System Integrity Protection (SIP). This protects a number of different parts of the system from modification, even by the all-powerful root user. (For this reason, SIP is often referred to as “rootless mode,” although this is a misnomer, as the root user still exists.)Read More
Is Apple’s walled garden showing signs of erosion?October 1, 2015
Thomas Reed, a Mac security expert and director of software maker Malwarebytes, calls the XcodeGhost attack “easily the largest App Store breach in history” and says the incident “will erode consumer confidence in the App Store as a (mostly) unassailable malware-free fortress.”Read More
Web ad tried to make my iPhone spaff a premium-rate text, says snapperSeptember 30, 2015
Thomas Reed, director of Mac offerings for security biz Malwarebytes, said this particular spammy technique was new to him. While malicious ads and webpages have been able to open up iTunes and the iOS App Store, the ability to compose a recipient and body for an SMS message is a troubling development.Read More
Scammers use Google AdWords, fake Windows BSOD to steal money from usersSeptember 30, 2015
Faced with the infamous Windows Blue Screen of Death (BSOD), many unexperienced computer users’ first reaction is panic. If that screen contains a toll free number ostensibly manned by Microsoft technicians who are there to help users overcome this problem, many are probably tempted to pick up the phone.
It is this reaction that cyber crooks are counting on. But how to make this fake screen appear on the user’s computer?
According to Malwarebytes’ researcher Jerome Segura, the latest scheme of this kind was detected only days ago. The crooks have been using Google’s AdWords to make links to malicious pages appear at the top of the Google Search page when user searched for “youtube”.Read More
Novel malware dupes victims with fake blue screen of deathSeptember 30, 2015
Now, a new and rather novel campaign has attracted cybersecurity firm Malwarebytes’ attention.
In a blog post on Monday, the team at Malwarebytes revealed their findings on a new malvertising campaign which uses the infamous Microsoft Windows’ Blue Screen of Death (BSOD) as its selling point.Read More
WinRAR vulnerability leaves users open to attackSeptember 30, 2015
An unpatched, critical remote code execution vulnerability within WinRAR’s SFX archive features has been revealed by a researcher.
Reza Espargham from Vulnerability Lab discovered the bug and this was reproduced Pieter Arntz from Malwarebytes.Read More
Critical WinRAR vulnerability places 500 million users at riskSeptember 30, 2015
Malwarebytes researcher Pieter Arntz said in a blog post the proof-of-concept code needs some “trivial” changes to work, but is ultimately sound.Read More