Jump to content


  • Posts

  • Joined

  • Last visited


0 Neutral

About Edisun

  • Birthday 05/02/1986

Contact Methods

  • Website URL
  • ICQ

Profile Information

  • Location
    San Antonio, TX
  • Interests
    Malware Analysis / Reverse Engineering / Programming

Recent Profile Visitors

5,679 profile views
  1. Thanks for all the help guys, I appreciate it. Please keep any concerns, feedback or suggestions coming and we'll get on them!
  2. Hey Corrine, could you post a screenshot of what you are seeing?
  3. Thanks for the feedback! We decided to go this route because a lot of times an important company news post or educational post or technical post might get lost under the constant stream with the old layout. This way, folks can find not only what subject matter they are looking for, but also how deep they want to go down the rabbit hole. For example, if you wanted to know about a new malvertising attack but not exactly how the attack works from a technical code level, you could find something in the Cybercrime category that should give a run-down of what is going on and how to keep safe. While if you really wanted to know exactly how a family of Ransomware operated, with snippets of the disassembled code and recreation of algorithms, you could go to Threat Analysis. Then of course, if all you wanted to know was what this Ransomware stuff you've been hearing about so much was all about, the 101 Category can give you a high level run-down of what it was, why its dangerous and what to do to avoid it. We plan on building on top of this a lot, so we really appreciate your thoughts! Thanks!
  4. That's the plan. We are starting with high level threat categories just to help get people educated about what certain types of Malware and attacks are, after that we plan to incorporate families and once we do, we'll be able to provide more technical information about how they operate. Glad you like the changes! We are really excited about this new chapter for MB!
  5. Hey folks, We've got a brand new Malwarebytes Labs! So why did we mess with a good thing? We decided that we wanted to provide you with even more opportunities for education, communication, and knowledge. So, we created Malwarebytes Labs, your one-stop shop for everything concerning cyberthreats. Here’s what's new: Threat Profiles This new section is like a wiki of threats. Each threat will have its own page that will list relevant information such as a short biography, history, removal, and avoidance procedures. The goal is to make it super easy to find out more about the kinds of malware and attacks that plague you and your family. The threat profile section is searchable, so it's easy to find what you are looking for. We plan to link these profiles with stories on the blog, so you can look up background info on the threat while you are reading a post about a new development. This section is "living," meaning that we'll update it and add to it all of the time, so make sure you check in frequently! New Categories We've condensed our content into five parent categories that allow us to write for a specific audience based on interest and use. Each parent category has several subcategories on topics ranging from Mac to mobile, so it's easy to find the information you're looking for. We have a new category called “101” just for the basics of computer security. These articles make it easy for you to learn something new or pass the info on to a cybersecurity noob who needs schooling. We also have a category for advanced technical analysis ("Threat analysis"), as well breaking news in "Cybercrime" and industry updates in "Security world." Finally, you can keep up-to-date on new Malwarebytes products and company announcements in the "Malwarebytes news" section. If you're the kind of person that likes everything, don't worry: we are still offering all of the content (regardless of category) in chronological order, just like we do now. Find that in the "All" section. Glossary Have you ever started reading one of our posts and come across a term you didn't recognize? Well, we now have a glossary of computer security and technology terms. Just like the threat profiles, this section is alive and we are going to be updating it with new terms all the time. We are also going to be linking glossary terms to our blog posts, so it doesn't take time away from learning about the latest threats. So that's it, that's the new Malwarebytes Labs! We hope veteran and new readers alike enjoy what we have built and will continue building. For those of you who have been dedicated readers for the last four years, I personally want to thank you for your continued support and look forward to making Malwarebytes Labs as great as it can be. Check it out here: https://blog.malwarebytes.org How do you like the new look? Let us know in this thread, all feedback is welcome!
  6. Hey Robert, We are sorry that you have had so much trouble with renewing your subscription to our product and then of course whatever is going on with your credit card information being stolen. We want to let you know that our support folks are reaching out to you via your support ticket to fix the problems with your license and hopefully we can help you figure out what happened to your CC info. Based on the information you provided us, it looks like scammers utilizing the Malwarebytes name might have stolen your CC info either by utilizing keylogger software or some other type of malware. We are going to work with you to figure that out and get it sorted. We do not take kindly to the bad guys using our good name to make themselves a buck and want to promise you that we always give our full attention to securing your personal information as well as making sure your experiences with our products and company are good. Thanks for bringing this up with us and like I said, our Support folks should be reaching out to you shortly. Thanks! Adam Kujawa Head of Malware Intelligence Malwarebytes
  7. We just posted a blog about this topic that gives all the information we currently have. We will keep it updated: https://blog.malwarebytes.org/hacking-2/2015/09/imgur-abused-in-ddos-attack-against-4chan/
  8. UPDATE: Our security has been established once again and you should have no problems reading and commenting on our blog securely. Thanks for your patience! If you've tried to visit our blog over the last 12 hours, you might have seen something like this that makes you think our site is untrusted or has been hacked. We wanted to let you all know that the site was not hacked and we are just dealing with some emergency maintenance as far as our security certificates go. See WordPress usually auto-renews security certificates so it's not really a problem we run into often. For whatever reason, this time our certificate was not renewed and communicated with WordPress to get this issue resolved as fast as we could. Security certificates are exchanged between your browser and the server hosting our blog to ensure that both of them are legitimate. In addition, once identities have been confirmed, a secure connection is created between the two so that everything you see on blog.malwarebytes.org is actually us and not a malicious attacker trying to fool you into downloading malware or getting exploited. We do apologize for the inconvenience. As we always try to provide the highest level of security advice, if you see something like this in the future, avoid the site until you see the lock icon in your URL bar. Stay Safe and Stay Alert!
  9. Hey Munchkin, I was hoping that Dell would remove the older version if the new version was installed, maybe that wasn't the case for you. I recommend going ahead and head over to Dell's website and install whatever their newest version is, here is a link: http://www.dell.com/support/home/us/en/19/Eula/scan?sourcePage=H&scanType=TMC&loadSection=N&tabName=&SWA=Y After that, update your Malwarebytes Anti-Malware and run another scan. If anything shows up, it should only be this: Registry Values: 1 PUP.Vulnerable.DellSystemDetect, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|DellSystemDetect, go ahead and remove that as you no longer need it. Hopefully nothing will be detected and the newer version of Dell System Detect will have removed the old version. Thanks so much and I hope this helps you!
  10. Hey Everyone, We just published a blog post that talks about this specific detection. You can see it here: http://wp.me/p2plUD-1WI Thanks!
  11. Edisun

    Reddit AMA

    The Topic Matter was for anything. You could just drop me a line via PM or hit me up via the various social media channels if you really wanted to know something. =P Reddit was a good place to pop our heads in and say hello. I don't really frequent Reddit, too busy fighting malware =P.
  12. You have been extremely lucky. It doesn't happen to everyone and if you keep things like Java or Flash updated, you are less likely to be hit by a drive-by because the majority of them use exploits that attack vulnerabilities that are already patched in updated software. I have had numerous people complain about Ransomware or other malware getting on their system from Drive-by attacks and not just the random user who posts to the forums but friends and family. I myself have never been a victim of a drive-by either and have the same security setup as you do. I go looking for malware every day but I keep everything updated and I just use common sense and I am fine. It is actually very easy to reduce the likelihood that you will be a victim of drive-by attacks, so it makes you wonder the security habits of people getting attacked every single day. To bring it to hard facts, our researchers have pulled in thousands of drive-by exploit URLs over the last year, regardless of whether or not you in particular are being attacked by them, they are still out there in greater and greater numbers and therefore are still a threat. Thanks for the comment, we always appreciate thoughts, questions and even debates from our readers. Stay Safe!
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.