Malwarebytes @ DefCon: The Wrap-Up

As mentioned last week, the Malwarebytes crew made it out to DefCon this year to check out all of the interesting talks and presentations given by various members of the computer/intelligence security community. This blog is meant to summarize most of what we saw, giving a brief explanation of which talks we thought were the…

Read more

Malwarebytes @ DefCon

That’s right, this week some of the Malwarebytes gang will be out in Las Vegas for the hacker convention: DefCon 20! Who is going? Marcin Kleczynski – CEO Rebecca Kline – Director of Marketing Josh Hall-Bachner – Web Developer Doug Swanson – VP of Development Adam Kujawa – Me! What are we doing there? DefCon…

Read more

The Malware That I Used To Know

Malware, much like all weapons, evolve based upon multiple factors, be it the protections of their intended target, the weapon operator and their organization or the general intent that it was created for.  Unlike most weapons though, malware evolved with a pattern closer to that of a biological disease.  Early variants were created and most…

Read more

Malwarebytes U.S. Removal Stats for June

Here at Malwarebytes, we are known to talk a big game and we wanted you to know that we always back it up.  Check out the Top 10 Malwarebytes Removals across the U.S. for June 2012 and see for yourself!   While we applaud the states we listed for using our product to keep themselves…

Read more

Phishing 101: Part 3

Over the last few weeks I have described numerous methods of phishing attacks and a few examples what they do or may look like.  In this final installment, I will shed some light on how phishing attacks are done and a few real world examples of techniques used by Phishing scammers.  Finally, I will discuss…

Read more

Select your language