Categories

Monthly Archives: April 2013

Safeguarding your online accounts against hackers

It is very likely that you or someone you know has had one or multiple of their online accounts hacked into. It happens to everybody: individuals, small and big companies alike, can have disastrous consequences and makes you feel extremely vulnerable. In this post we will talk about some tips to give cyber-criminals a hard(er) […]

CTA: New Java Vulnerability

URGENT: Despite a recent critical patch to Java SE, Polish security firm Security Explorations released details of yet another Java vulnerability.  Adam Gowdiak, a researcher from the firm provides a full disclosure of the exploit here.

Too Tough to Crack?

During the course of your life, there are many times when you have to prove who you are.  Whether it’s applying for a loan, getting your driver’s license, or signing into your email account, a process has to occur to “authenticate” your identity.  Otherwise, anybody could be you.

Improvements to our Updating Process

It’s been a rough week here at Malwarebytes, and I’m sure for many of you as well. We’ve spent the entire week focused on supporting the users affected by Monday’s false positive, as well as implementing systems to prevent this type of problem from ever happening again. If you have not yet received help, please route […]

We are accustomed to seeing criminals take advantage of big events to push malware, so we always keep an eye out for malicious emails or websites. This one was no exception with customized spam messages and malicious links all leading to nasty infections. The emails come with a subject line such as “Aftermath to explosion […]

Yesterday’s Database Update Issue

It saddens me to report that at around 3 PM PST yesterday, Malwarebytes released a definitions update that disabled thousands of computers worldwide. Within 8 minutes, the update was pulled from our servers. Immediately thereafter, users flocked to our support helpdesk and forums to ask us for a fix. I want to offer my sincere […]

Our New Digs

It’s a beautiful day in our new neighborhood! Moving from a tiny, overly-crowded office to the shiny new Malwarebytes headquarters overlooking downtown San Jose has been pretty sweet, I must say. Though technically, we’ve been in this new office building for almost three months now, I guess it’s not official until you do a ribbon cutting of […]

[ Need assistance? Please consult our Help & Resource Page ]  Have you ever received a call from someone with a heavy Indian accent from Microsoft saying your computer had errors or viruses? The purpose of these calls is to get an easy $299 (or whatever amount they choose) by scaring you into thinking there’s […]

Surfing by proxy

Proxy (the authority to act for someone else)  is a term that we use, when related to computers, to describe using a third party between the user and the internet. Looking at the reasons to use a proxy will help us further on, when we look at the different kinds of proxies, and related methods. […]

Redkit Exploit Kit does the splits

Exploit Kit authors must really love Java . Not only is it ripe with vulnerabilities but its own language provides a great platform to write and deliver malware in different ways. We are used to seeing encrypted payloads (XOR, AES encryption), applets containing both the exploit itself and the binary payload. Today we will talk […]

Malware in a Jar

As researchers find more security flaws in Oracle Java, the software continues to be used for exploitation and malware delivery.  This year has been a shaky start for the cross-platform web technology, where it seems the number of documented vulnerabilities is hard to number. If you recall in January, we saw a zero-day later found […]

Malwarebytes Hit by Targeted Attack!

Dear Readers, We regret to inform you that over the weekend, Malwarebytes was under direct, targeted attack from a new type of malware of unknown origin. The malware was shutting down systems left and right at our headquarters. We were able to cut off its spread through our network and obtain a sample of it […]

Subscribe to our YouTube Channel