Categories

Posts by Adam Kujawa

Lead of the Malware Intelligence Team with nearly 10 years of experience fighting malware behind the scenes and on the front. Follow me @kujman5000

Yelling Across the Gap

German researchers proved that malware could communicate via audio, what does that mean for the future?

Potentially Unwanted Programs take the low road and steal users resources by installing Bitcoin Miners without their knowledge.

Tracking the Locker

CryptoLocker has infected over 34,000 systems between September and early November with 79% of the infections have been located in the U.S. alone.

Bitcoins, Pools and Thieves

Bitcoin started out as a digital currency, free from duplication and free from centralization and assumed, free from organized crime. However over the last couple weeks, there have been two major incidents against online Bitcoin trading and storage that have resulted in the loss of approximately $5.4 Million in Bitcoins. The exchange rate currently lies […]

Prepare … for Unpacked 2.0

The new and improved Malwarebytes Unpacked is here! Thank you to all our readers for giving us a little bit of their time for the sake of security.

The ploy is the same, the face is different. Phone scammers are now posing as the popular anti-virus AVG’s customer service.

Chrome’s Solution to the Unsavvy Poses A Potential Risk

Is Google Chrome’s attempts at making it “easier” for users to find where they want to go, show that their security purview isn’t focused enough on the internal threats?

Phone Scammers Take A Move From The Ransomer’s Playbook

Posing as the local police, scammers are now employing software that spoofs caller ID to appear that they are calling from the local sheriff’s department to steal unsuspecting people’s money.

Phishing is for the birds

Typically reserved for emails, one of the largest threats facing users today is Phishing attacks. These types of attacks are now leaking over to social media.

Fake shopper scam recruits money mules

Cyber-criminal are scamming shoppers into being their money mule. Learn how to protect yourself.

This month marks the 10th Anniversary of National Cyber Security Awareness Month and hopefully influences folks to learn, prepare and take action to make our shared cyber world a safer one.

Ransomware Puts Your System To Work Mining Bitcoins

Newer version of the Reveton ransomware uses Bitcoin mining to always makes a profit, regardless if the users are willing to pay, or not pay, the ransom.

Vulnerabilities Away, it’s Patch Tuesday!

With all the talk about backdoor encryption, phishing attacks and privacy, I think it’s a good time to mention that today is Patch Tuesday! That means that Microsoft is releasing a lot of critical updates to their software today; updates that deal with some of the concerns of the day.

The SEA was at it again on Monday when they attempted to gain sympathy from members of the U.S. Marine Corps. How did they do it? By hacking of course!

Right on Cue, Hijackers Pose as NSA

Ransomware authors are now posing as the NSA, claiming to be using the PRISM system to identify users performing illegal activities and demanding payment for their system to be unlocked.

Fake Malwarebytes Scammer Surveys Victims

Scammers are at it again with their attempts to get users to download unnecessary software, visit pointless (and potentially dangerous) sites and filling out surveys for their own profit. This time however, their tactic method hit a little close to home.

Malwarebytes AV Compatibility Report

Malwarebytes Anti-Malware is an additional protection, used to catch what antivirus products don’t. Layered security is the best security.

DEFCON 21: An Odyssey

A little story about my adventures in hacker land at DEFCON 21.

Malwarebytes @ DEFCON

While lots of fun and very informative, DEFCON can also be a dangerous place and if you plan on going this week, we are also giving you some tips on how to keep your money and info safe — though we can’t protect you against losing at poker.

Vulnerability Bounty Hunting In Action

Last week, security researcher Roy Castillo posted a recount of interactions with Facebook about a bug that he had found. Will bug bounty hunting become the norm?

« Previous PageNext Page »

Subscribe to our YouTube Channel