Welcome to the new Malwarebytes Unpacked…err…Labs! It’s new, improved, and bigger than ever. Hope you like it.
So why did we mess with a good thing? We decided that we wanted to provide you with even more opportunities for education, communication, and knowledge. So, we created Malwarebytes Labs, your one-stop shop for everything concerning cyberthreats. Here’s what’s new:
This new section is like a wiki of threats. Each threat will have its own page that will list relevant information such as a short biography, history, removal, and avoidance procedures. The goal is to make it super easy to find out more about the kinds of malware and attacks that plague you and your family.
The threat profile section is searchable, so it’s easy to find what you are looking for. We plan to link these profiles with stories on the blog, so you can look up background info on the threat while you are reading a post about a new development. This section is “living,” meaning ..
It’s that time again, a new operating system emerges from the Microsoft incubator! While many of you might not get to experience Windows 10 just yet or even in the foreseeable future, we want you to know that when you decide to use it, Malwarebytes has got your back.
The latest versions of our Malwarebytes products supports Windows 10! And that includes:
Malwarebytes Anti-Malware Free
Malwarebytes Anti-Malware Premium
Malwarebytes Anti-Exploit Free
Malwarebytes Anti-Exploit Premium
Malwarebytes Anti-Malware for Business
Malwarebytes Anti-Exploit for Business
Malwarebytes Anti-Malware Remediation Tool
Malwarebytes Endpoint Security
So one of the first things you should do after setting up your new operating system is to download Malwarebytes Anti-Malware. Trust me, the cyber criminals won’t wait until everyone is comfortable with Windows 10 to start targeting folks using it.
To see our CEO Marcin Kleczynski’s forum announcement about this news click here.
To download the latest Malw..
We have just released Malwarebytes Anti-Exploit 1.07. This latest version brings in some new features, improvements and bug fixes.
Malwarebytes Anti-Exploit uses a combination of one enforcement layer and three protection layers to block attacks. In this version, we have added new mitigation techniques to stop threats earlier during the exploitation phase.
Last month, we documented how the top exploit kit (Angler EK) had given up on attempting to exploit users running our software.
However, we are not resting on our laurels and still test the exploit kit regardless.
In the example below, we are blocking Angler’s Internet Explorer exploit by stopping a malicious VBScript:
As more and more Office documents are using Macros to deliver malware – in particular the Dridex banking Trojan – we have also hardened our layer 3 protection which focuses on malicious behaviors (i.e. Microsoft Word wants to run an executable):
(Please note that only Malwarebytes Anti-Exploit Premium shields Off..
As you know, Malwarebytes has worked hard on making a stance against Potentially Unwanted Programs (PUPs) and through our diligent efforts have managed to not only protect our users from the junk of the internet but also upset quite a few PUP peddlers (as we like to call them).
Well, we are about to get a whole truck load of angry letters after this! This morning, our CEO Marcin Kleczynski posted on our forums about a new acquisition by the Malwarebytes team of a really great tool that will assist us in fighting the bad guys on the PUP front:
Junkware Removal Tool is consistently one of the top downloads on Bleeping Computer, Major Geeks and other download sites, and you want to check it out for yourself before we add it to the powerhouse that is Malwarebytes Anti-Malware.
Keep in mind that this tool does not have an “Install” phase and runs when you execute it.
It will also automatically close the applications you may be using while it scans so make sure you have saved and closed ..
Did you know that the majority of new malware is delivered via the web through a process known as a drive-by download attack?
The scenario is quite simple: you browse to a website and malicious code is downloaded to your computer automatically without your knowledge or approval.
Contrary to some beliefs, you do not need to browse to shady websites for this to happen. In fact, all websites are a potential source of infection either because they can get compromised or because they host a malicious advertisement.
Figure 1: Drive-by download scenario
This phenomenon takes advantage of software vulnerabilities that exist in browsers (Internet Explorer, Firefox, etc.) as well as their plugins (Flash Player, Silverlight, Java, Reader, etc.).
There is no such thing as a “safe” site anymore
That is why it is crucial to keep your computer up-to-date and also get rid of programs you rarely use to reduce the potential attack surface.
But even so, there are times when even the most patched m..