Sometimes it’s easy to forget that malware targets other Operating Systems besides Windows. However, it does exist, and is equally potent in its malicious nature.
Researchers at RSA recently uncovered a new Linux Bank Trojan called “Hand of Thief”. Offered in closed cyber-crime communites Continue reading
If you read my post last week about some of the Malwarebytes team heading out to Las Vegas for DEFCON 21 then you might be interested in how it went. Well, rather than doing what I did last year and just list the talks and describe them, here is a little story about my adventures in hacker land.
Day 1 Thursday:
I got up SUPER early (for me anyway and considering I traveled back in time 2 hours when I landed in LV) in order to head downstairs from my room in the Rio to purchase my DEFCON badge.
After waiting for 30 min to get a coffee from one of the two Starbucks in the casino, I took the walk to where the line for badges started. I waited in line for about an hour and a half and once I got my badge, we spent the next few hours just trying to figure out exactly what we were looking at.
The badges are very neat and as with the badges at DEFCON every year, they have multiple puzzles and purposes that might not even be discovered by attendees until months after DEFCON ends.
This week is full of security conferences, with Black Hat already starting off, along with BSides LV and later this week, DEFCON!
Being part of the security community, Malwarebytes is going to be hanging out in Las Vegas for DEFCON, the largest gathering of security specialists in the world. We are going to be watching some talks, live tweeting our adventures and letting our readers in on the DEFCON world!
While lots of fun and very informative, DEFCON can also be a dangerous place and if you plan on going this week, we are also giving you some tips on how to keep your money and info safe — though we can’t protect you against losing at poker.
Over the last few days two popular VOIP apps, Tango and Viber, had their servers breached that compromised customer data and support sites.
The Syrian Electronic Army (SEA), a pro-Assad hacker group known for hacking Western websites, typically defacing and trying to push Syrian propaganda, have claimed responsibility. The group has claimed responsibility for hacking The Onion and The Guardian’s Twitter accounts among others.
Last week, security researcher Roy Castillo posted a recount of interactions with Facebook about a bug that he had found. The bug allowed anyone to look up the real e-mail address of any Facebook member.
Roy wrote about how someone could exploit the bug and what happened after letting Facebook know. I think this is a great article about the reality of bug bounties that numerous companies have been posting, reaching out to independent security researchers to help in securing their software before potentially damaging vulnerabilities are discovered by the wrong people.