Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

6/22/2015
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Malwarebytes Acquires Junkware Removal Tool

Acquisition of popular security tool reinforces Malwarebytes' commitment to fighting against potentially unwanted programs (PUPs)

SAN JOSE, CA – June 22, 2015 – Malwarebytes, the company founded to protect people and businesses from sophisticated malware attacks, today announced the acquisition of Junkware Removal Tool, a security program that searches for and removes potentially unwanted programs (PUPs) such as adware, spyware, and toolbars. The acquisition will integrate its definitions and tactics into the Malwarebytes product line. Junkware Removal Tool owner and developer, Filipos Mouliatis, will also be joining Malwarebytes Labs out of Houston, Texas.

“Malwarebytes is a highly respected anti-malware and anti-exploit company that I’ve known of for years, so I was excited to hear about the possibility of working together,” said Mouliatis. “I look forward to helping further develop software that will destroy potentially unwanted programs such as adware and spyware.”

“Let’s face it, PUPs are a growing problem, and the Junkware Removal Tool is a fantastic addition to strengthen our ability to address them,” said Malwarebytes founder and CEO Marcin Kleczynski. “We’re proud to be integrating this technology. Not only that, Filipos’ creativity and ingenuity are great additions to the Malwarebytes team. With this move and others to come, we’re doubling down on expanding our PUP protections, and our customers will see the benefits very soon.”

Junkware Removal Tool is a popular download on sites such as CNET, MajorGeeks, and BleepingComputer.com. The security utility consistently ranks in the top 10 downloaded Windows apps on all three sites, and has had more than 4 million downloads on BleepingComputer.com alone.

“At BleepingComputer.com, we’ve found that adware and PUPs have increasingly become one of the largest sources of problems for our visitors,” said Lawrence Abrams, owner of BleepingComputer.com. “With Malwarebytes and Junkware Removal Tool being two of the most popular downloads, it’s going to be exciting to see how these two programs will join forces to further protect our visitors against adware and PUPs.”

Malwarebytes has already taken an aggressive stance on targeting and removing PUPs, adware, spyware, and grayware. Acquiring Junkware Removal Tool reinforces its commitment to fighting not only harmful and deceptive PUPs, but also annoying and misleading ones.

The integration of Junkware Removal Tool within Malwarebytes Anti-Malware will take place over the next few months. The stand-alone JRT program will remain intact for those who wish to use it. 

About Malwarebytes

Malwarebytes provides anti-malware and anti-exploit software designed to protect businesses and consumers against zero-day threats that consistently escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware earned an “Outstanding” rating by CNET editors, is a PCMag.com Editor’s Choice, and was the only security software to earn a perfect malware remediation score from AV-TEST.org. That’s why more than 50,000 SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, Malwarebytes is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts. For more information, please visit us at www.malwarebytes.org.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4682
PUBLISHED: 2021-01-28
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
CVE-2020-4888
PUBLISHED: 2021-01-28
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker co...
CVE-2020-13569
PUBLISHED: 2021-01-28
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can...
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.