Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks

Researchers called it KNOB, a clever attack against the firmware of a Bluetooth chip that can allow hackers to successfully hijack paired devices and steal their sensitive data. Are users at risk?

Read more

Browser push notifications: a feature asking to be abused

Whoever invented browser push notifications must have been able to guess they would be abused for advertising. This post explains what they are and how to disable them.

Read more

Fileless malware: getting the lowdown on this insidious threat

In this series of articles, we provide an in-depth discussion of fileless malware and their related attacks. In part one, we cover a brief overview of the problems with and general features of fileless malware, laying the groundwork for technical analysis of various samples employing fileless and semi-fileless methods.

Read more

Free tools: Internet traffic monitoring

There are many reasons why you might want to start Internet traffic monitoring, especially if you’re a security enthusiast or amateur analyst. We list some free tools that have different use cases.

Read more

Solution Corner: Malwarebytes Incident Response

We recently announced Malwarebytes Incident Response, a centralized threat detection and remediation platform that helps businesses accelerate their response workflows for these types of threats while reducing attack dwell times. Malwarebytes Incident Response scans networked endpoints for advanced threats including malware, PUPs, and adware, and removes them.

Read more

The worm that spreads WanaCrypt0r

WanaCrypt0r is a ransomware infection that has spread through many corporate networks. Read a technical analysis of the worm that allowed it to do this.

Read more

Adware the series, part 3

Part 3 in this series deals with removing programs and files responsible for the unsolicited advertisements.

Read more

ShadowBrokers releases more stolen information

ShadowBrokers shocked the security world again today by releasing another cache of exploits, files, and operational documents purportedly stolen from Equation Group last summer. As you may recall from our earlier publications, Equation Group is reportedly a clandestine hacking group that has been linked with NSA hacking tools.

Read more

Explained: Environmental variables

This post is intended to make readers aware of the existence and use of environmental variables. A windows feature that is often only known to programmers and other advanced users.

Read more

A closer look at a tech support screen locker

As a demonstration of how Tech Support Scammers operate and try to lure victims into calling their number, we show you some snippets of the code, explaining what they’re up to.

Read more

Select your language