Monthly Archives: July 2013

Last week, Google started rolling out an updated version of Jelly Bean, which has some new features. Some are covered here by our Josh Cannell. However, what’s most interesting to me are the updates to Google Play Services and how it could impact the Android ecosystem in a positive way. Google Play Services, an Android […]

Malwarebytes @ DEFCON

While lots of fun and very informative, DEFCON can also be a dangerous place and if you plan on going this week, we are also giving you some tips on how to keep your money and info safe — though we can’t protect you against losing at poker.

Cyber-crooks are spamming through every avenue they can, hoping to lure their victims into revealing personal information or tricking them with scam SMS text messages.

How to encrypt files and folders

Encrypting files and folders is a way to protect them from unwanted access. Although modern Windows versions do have built-in options to store files in an encrypted format on your hard disk, you may be looking for another option.

As motor vehicles advance technologically, they incorporate more and more computers, hacking cars isn’t all that far fetched.

Malwarebytes Anti-Malware previously detected only harmful or deceiving PUPs. Today, We’re revising our policy to include PUPs that our users find annoying or misleading.

Yesterday, Google unveiled the latest version of it’s renowned Android Operating System at an event in San Francisco. Of the improvements to security, the most notable is the implementation of SELinux, a Mandatory Access Control (MAC) system which grants users greater access control.

ZeroAccess uses Self-Debugging

In the field of malware analysis, debuggers are a vital tool used to reverse-engineer malware binaries, helping analysts to understand the purpose and functionality of malware when dynamic analysis isn’t enough.

Two popular VOIP apps, Tango and Viber, had their servers breached that compromised customer data and support sites. Syrian Electronic Army (SEA), SEA is a pro-Assad hacker group known for hacking Western websites, have claimed credit for the hack.

Enterprise Cyber Security Earns a Failing Grade

A recent survey, commissioned by Malwarebytes, found that most enterprise organizations are failing to protect themselves effectively against cyber threats. These enterprise businesses are vulnerable to online attacks and it’s largely due to increasingly sophisticated malware, social engineering attacks and/or a lack of user education.

Last week, security researcher Roy Castillo posted a recount of interactions with Facebook about a bug that he had found. Will bug bounty hunting become the norm?

How to encrypt your email

Given recent worries about data-leaks and other privacy issues, it might be handy to have some tools to make it harder for third parties to unravel your data. One such method is encryption.

Apple’s OS X FBI Ransomware Goes Global

Further customizations of the Mac ransom pages discovered today shows the bad guys are busy updating their templates for each country’s police force.

Bi-Directional Trickery, (╯°□°)╯︵ oןɹ

Malware authors are known to try various obfuscation techniques in order to hide their malware. The Unicode Right-to-Left trick (RLO), which has been known for quite some time, has been reported again by security firm F-Secure, showing its resurgence.

Google was quick to fix their Android master key flaw, but Android’s fragmented update model across several OEMs is leaving most users unprotected. You can take it in your own hands to fix this but it will require rooting your phone.

Tumblr Security Hole Reveals Passwords

iOS Tumblr users’ passwords were exposed after not being encrypted using SSL. Tumblr released an update for their iOS apps after the recently discovered security hole.

A Q&A about the Mac FBI “ransomware”

For years, Windows users have been plagued by ransomware demanding several hundred dollars to unlock their computers. Now there’s a growing market to attack Macs.

Tracking devices are not a new thing, but what if you took that same technology to finding your keys or your stolen bike? The ability to track down missing/stolen property isn’t new. Showing up at the doorstep of a bike thief’s house is.

Facebook’s rollout of Graph Search is said to deliver a brand new experience that allows you to get information you would not get from a typical search engine, something like a more ‘wholesome search experience.’

Next Page »

Subscribe to our YouTube Channel