January 30, 2013 | BY
UPDATE: As of 1/28, the Facebook page for Malwarebiter appears to have been deleted. Overview A few days ago Malwarebytes Intelligence Analyst Adam Kujawa released a Cyber-Threat Advisory on a fairly new anti-malware product on the web called “Malwarebiter”. This product grabbed our attention because of its similar name to Malwarebytes.
January 25, 2013 | BY
URGENT: Malwarebytes mimic site ‘Malwarebiter(dot)com’ hosts fake anti-malware product and spreads malware. ACTION: Do NOT visit ‘Malwarebiter(dot)com‘ unless you are using a secured environment (i.e. Virtual Machine or Sandbox)
January 21, 2013 | BY
2012 was a dangerous year, packed with threats such as Drive-by exploits, Ransomware, phishing scams and state-sponsored malware. Those who payed attention stayed safe by using anti-malware solutions combined with safe surfing practices and other defensive software. However many people did not and unfortunately, millions of them became victims of cyber-crime. Now that we have […]
January 14, 2013 | BY
Update (1/14/2013) Oracle has issued an emergency patch to be shipped with version 7 update 11. While we are pleased to see a quick turnaround time, we stand by our initial recommendations to disable Java in your browser. This is still the most exploited piece of software and whether it is patched or not still unnecessarily puts you […]
January 10, 2013 | BY
URGENT: New Java Exploit being used to infect Updated Users. ACTION: Disable Java Browser Plugin using: http://nakedsecurity.sophos.com/2012/08/30/how-turn-off-java-browser/ http://krebsonsecurity.com/how-to-unplug-java-from-the-browser/ DETAILS: As of yesterday, a new Java exploit has been developed and released to the cyber-crime community. It is currently in the wild and being used to distribute malware such as the Reveton Ransomware.
January 2, 2013 | BY
The majority of computers get infected from visiting a specially crafted webpage that exploits one or multiple software vulnerabilities. It could be by clicking a link within an email or simply browsing the net, and it happens silently without any user interaction whatsoever. Vulnerabilities are flaws that exist in various programs and that allow someone to […]