How cryptocurrency mining works: Bitcoin vs. Monero

Credit to Author: Pieter Arntz| Date: Mon, 11 Dec 2017 16:00:08 +0000

Why threat actors prefer mining for Monero rather than for the very hot Bitcoin cryptocurrency? Let us point out some possible reasons.

Categories:

Tags:

(Read more…)

The post How cryptocurrency mining works: Bitcoin vs. Monero appeared first on Malwarebytes Labs.

Read more

How to harden AdwCleaner’s web backend using PHP

Credit to Author: Jérôme Boursier| Date: Wed, 06 Dec 2017 16:00:28 +0000

More and more applications are moving from desktop to the web, where they are particularly exposed to security risks. They are often tied to a database backend, and thus need to be properly secured, even though most of the time they are designed to restrict access to authenticated users only. PHP is used to develop…

Categories:

Tags:

(Read more…)

The post How to harden AdwCleaner’s web backend using PHP appeared first on Malwarebytes Labs.

Read more

Blockchain technology: not just for cryptocurrency

Credit to Author: Pieter Arntz| Date: Tue, 05 Dec 2017 18:20:53 +0000

We’ve talked about how cryptocurrency uses blockchain technology. Now we take a closer look at its other applications, and why blockchain is on the brink of changing the world.

Categories:

Tags:

(Read more…)

The post Blockchain technology: not just for cryptocurrency appeared first on Malwarebytes Labs.

Read more

When you shouldn’t trust a trusted root certificate

Credit to Author: Pieter Arntz| Date: Thu, 16 Nov 2017 17:30:00 +0000

A trusted root certificate is the cornerstone of authentication and security in software and on the Internet. But even this can be abused by criminals. Learn when you shouldn’t trust these trusted sources.

Categories:

Tags:

(Read more…)

The post When you shouldn’t trust a trusted root certificate appeared first on Malwarebytes Labs.

Read more

Analyzing malware by API calls

Credit to Author: Pieter Arntz| Date: Tue, 31 Oct 2017 18:59:11 +0000

As an alternative to reverse engineering malware that is protectively packed, we look at the option of analyzing malware by API calls to determine what a file might be up to.

Categories:

Tags:

(Read more…)

The post Analyzing malware by API calls appeared first on Malwarebytes Labs.

Read more

Digital forensics: How to recover deleted files

Credit to Author: Pieter Arntz| Date: Tue, 24 Oct 2017 17:00:21 +0000

What happens exactly when you delete a file, and how easy or hard is it to recover deleted files? Learn the differences between delete, erase, and overwrite according to digital forensics.

Categories:

Tags:

(Read more…)

The post Digital forensics: How to recover deleted files appeared first on Malwarebytes Labs.

Read more

Why is Malwarebytes blocking CoinHive?

Credit to Author: Adam Kujawa| Date: Wed, 18 Oct 2017 15:00:25 +0000

Since September 19, the number two most frequently blocked website for our customers has been coinhive.com. This post will describe what CoinHive is, what it is doing, and why we are blocking it.

Categories:

Tags:

(Read more…)

The post Why is Malwarebytes blocking CoinHive? appeared first on Malwarebytes Labs.

Read more