Categories

Posts by Adam Kujawa

Lead of the Malware Intelligence Team with nearly 10 years of experience fighting malware behind the scenes and on the front. Follow me @kujman5000

Scammer Network Recruits Penniless Gamer Army

Scammers take advantage of penniless gamers to push survey scams by advertising free games and presenting endless surveys.

Prepare to Surf the Wave of Updates

The annual Pwn2Own competition at CanSecWest exposed loads of zero-day exploits. Prepare for the floods of updates to fix these security holes.

Malicious Messages Foray Facebook

A trojan is circulating through Facebook stealing accounts and (probably) taking creds.

Bitcoin Trouble on the Open Express

Why is everyone attacking Bitcoin users?

Android Botnets Hop on the TOR Train

Cyber criminals can infiltrate your mobile devices with the just discovered first “TOR Trojan for Android”.

Bitcoin Theft in the Underground

Silk Road 2, the underground marketplace specializing in nefarious services, had all of its Bitcoins stolen.

Malwarebytes Now Accepts Bitcoins!

As of today, we are accepting Bitcoin as valid payment for our products!

Esurance Giveaway Brings Out The Worst In Scammers

Careful who you follow. Esurance contest brings offers a chance to win as well as a chance to be scammed.

GFI labs released a report today on the most vulnerable applications and operating systems of 2013.

What the future of purchasing might look like

Threats like the Target breach are forcing retailers, financial institutions and security services to reconsider how we pay.

Bieber Arrest Leads to Survey Scam

Fans all over the world cry out in support of the #FreeBieber movement and scammers are finding a prime opportunity to make some cash.

Feds bust group selling counterfeit credit cards online.

Malicious Acquisition vs Moral Development

Malware authors look for new infection opportunities in pre-existing user bases, say for example, those that use browser extensions.

Encryption is Loud and the Walls Have Ears

Researchers discovered a way to decrypt RSA-4096 encryption just by listening.

Give a Doge a Coin

Wow. Very cryptocurrencies. Such popular meme. So insecure? Wow.

Bug Bounties and the Price of Security

Digging for bugs and exploits for money? There are advantages as well as disadvantages to establishing a universal bug bounty program.

Miner Madness!

How real malware tactics are being used to steal your system resources via miners.

Paperghost is now Haunting Malwarebytes!

Super well-known security researcher, Chris Boyd (aka @paperghost) joins Malwarebytes Intel team!

Malwarebytes 2013 Threat Report

The internet is no long just the “Wild West” but will be an all-out warzone in 2014.

Yelling Across the Gap

German researchers proved that malware could communicate via audio, what does that mean for the future?

Next Page »

Subscribe to our YouTube Channel