Browser push notifications: a feature asking to be abused

Whoever invented browser push notifications must have been able to guess they would be abused for advertising. This post explains what they are and how to disable them.

Read more

Fileless malware: getting the lowdown on this insidious threat

In this series of articles, we provide an in-depth discussion of fileless malware and their related attacks. In part one, we cover a brief overview of the problems with and general features of fileless malware, laying the groundwork for technical analysis of various samples employing fileless and semi-fileless methods.

Read more

Free tools: Internet traffic monitoring

There are many reasons why you might want to start Internet traffic monitoring, especially if you’re a security enthusiast or amateur analyst. We list some free tools that have different use cases.

Read more

Solution Corner: Malwarebytes Incident Response

We recently announced Malwarebytes Incident Response, a centralized threat detection and remediation platform that helps businesses accelerate their response workflows for these types of threats while reducing attack dwell times. Malwarebytes Incident Response scans networked endpoints for advanced threats including malware, PUPs, and adware, and removes them.

Read more

The worm that spreads WanaCrypt0r

WanaCrypt0r is a ransomware infection that has spread through many corporate networks. Read a technical analysis of the worm that allowed it to do this.

Read more

Adware the series, part 3

Part 3 in this series deals with removing programs and files responsible for the unsolicited advertisements.

Read more

ShadowBrokers releases more stolen information

ShadowBrokers shocked the security world again today by releasing another cache of exploits, files, and operational documents purportedly stolen from Equation Group last summer. As you may recall from our earlier publications, Equation Group is reportedly a clandestine hacking group that has been linked with NSA hacking tools.

Read more

Explained: Environmental variables

This post is intended to make readers aware of the existence and use of environmental variables. A windows feature that is often only known to programmers and other advanced users.

Read more

A closer look at a tech support screen locker

As a demonstration of how Tech Support Scammers operate and try to lure victims into calling their number, we show you some snippets of the code, explaining what they’re up to.

Read more

iPad error? Windows fakeout

This bogus error site can’t decide if Windows or an iPad is at risk. Given the URL, you’d expect to see some sort of iPad related shenanigans taking place – an interesting twist on the well worn theme of tech support scams.

Read more

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language