Categories

Posts by Adam Kujawa

Lead of the Malware Intelligence Team with nearly 10 years of experience fighting malware behind the scenes and on the front. Follow me @kujman5000

Bug Bounties and the Price of Security

Digging for bugs and exploits for money? There are advantages as well as disadvantages to establishing a universal bug bounty program.

Miner Madness!

How real malware tactics are being used to steal your system resources via miners.

Paperghost is now Haunting Malwarebytes!

Super well-known security researcher, Chris Boyd (aka @paperghost) joins Malwarebytes Intel team!

Malwarebytes 2013 Threat Report

The internet is no long just the “Wild West” but will be an all-out warzone in 2014.

Yelling Across the Gap

German researchers proved that malware could communicate via audio, what does that mean for the future?

Potentially Unwanted Programs take the low road and steal users resources by installing Bitcoin Miners without their knowledge.

Tracking the Locker

CryptoLocker has infected over 34,000 systems between September and early November with 79% of the infections have been located in the U.S. alone.

Bitcoins, Pools and Thieves

Bitcoin started out as a digital currency, free from duplication and free from centralization and assumed, free from organized crime. However over the last couple weeks, there have been two major incidents against online Bitcoin trading and storage that have resulted in the loss of approximately $5.4 Million in Bitcoins. The exchange rate currently lies […]

Prepare … for Unpacked 2.0

The new and improved Malwarebytes Unpacked is here! Thank you to all our readers for giving us a little bit of their time for the sake of security.

The ploy is the same, the face is different. Phone scammers are now posing as the popular anti-virus AVG’s customer service.

Chrome’s Solution to the Unsavvy Poses A Potential Risk

Is Google Chrome’s attempts at making it “easier” for users to find where they want to go, show that their security purview isn’t focused enough on the internal threats?

Phone Scammers Take A Move From The Ransomer’s Playbook

Posing as the local police, scammers are now employing software that spoofs caller ID to appear that they are calling from the local sheriff’s department to steal unsuspecting people’s money.

Phishing is for the birds

Typically reserved for emails, one of the largest threats facing users today is Phishing attacks. These types of attacks are now leaking over to social media.

Fake shopper scam recruits money mules

Cyber-criminal are scamming shoppers into being their money mule. Learn how to protect yourself.

This month marks the 10th Anniversary of National Cyber Security Awareness Month and hopefully influences folks to learn, prepare and take action to make our shared cyber world a safer one.

Ransomware Puts Your System To Work Mining Bitcoins

Newer version of the Reveton ransomware uses Bitcoin mining to always makes a profit, regardless if the users are willing to pay, or not pay, the ransom.

Vulnerabilities Away, it’s Patch Tuesday!

With all the talk about backdoor encryption, phishing attacks and privacy, I think it’s a good time to mention that today is Patch Tuesday! That means that Microsoft is releasing a lot of critical updates to their software today; updates that deal with some of the concerns of the day.

The SEA was at it again on Monday when they attempted to gain sympathy from members of the U.S. Marine Corps. How did they do it? By hacking of course!

Right on Cue, Hijackers Pose as NSA

Ransomware authors are now posing as the NSA, claiming to be using the PRISM system to identify users performing illegal activities and demanding payment for their system to be unlocked.

Fake Malwarebytes Scammer Surveys Victims

Scammers are at it again with their attempts to get users to download unnecessary software, visit pointless (and potentially dangerous) sites and filling out surveys for their own profit. This time however, their tactic method hit a little close to home.

1 2 3 4 5

Subscribe to our YouTube Channel