Read the original article: Good news: Stalkerware survey results show majority of people aren’t creepy Stalkerware survey results are in. See how more than 4500 Labs readers responded when asked, “Have you ever used an app to monitor your partner’s…
Tag: Malwarebytes Labs
The cybersecurity skills gap is misunderstood
Read the original article: The cybersecurity skills gap is misunderstood The cybersecurity skills gap is misunderstood. Rather than a lack of talent, there is a lack of understanding in how to find and hire that talent. Categories: Business Tags: (ISC)Aspen…
A week in security (August 17 – 23)
Read the original article: A week in security (August 17 – 23) A roundup of cybersecurity news from August 17 – 23, including our Enduring from Home report, and the impact of COVID-19 on healthcare security. Categories: A week in…
‘Just tell me how to fix my computer:’ a crash course on malware detection
Read the original article: ‘Just tell me how to fix my computer:’ a crash course on malware detection For the Luddites and the technologically challenged, this is your crash course on malware detection. Learn what it is, how it works,…
20 percent of organizations experienced breach due to remote worker, Labs report reveals
Read the original article: 20 percent of organizations experienced breach due to remote worker, Labs report reveals In Labs’ latest report, Enduring From Home: COVID-19’s Impact on Business Security, we look at responses from 200 IT professionals on how they…
The impact of COVID-19 on healthcare cybersecurity
Read the original article: The impact of COVID-19 on healthcare cybersecurity COVID-19 has put incredible pressure on the healthcare sector. How did the pandemic impact healthcare cybersecurity? Categories: Vital infrastructure Tags: covid-19healthcarehealthcare cybersecurityhealthcare securitysecurity (Read more…) The post The impact…
Lock and Code S1Ep13: Monitoring the safety of parental monitoring apps with Emory Roane
Read the original article: Lock and Code S1Ep13: Monitoring the safety of parental monitoring apps with Emory Roane This week on Lock and Code, we talk to Emory Roane, policy counsel at Privacy Rights Clearinghouse, about parental monitoring apps. Categories:…
Explosive technology and 3D printers: a history of deadly devices
Read the original article: Explosive technology and 3D printers: a history of deadly devices We look at how successful hardware hacks can damage devices—and potentially even put lives at risk. Categories: Hacking Tags: 3d printerhackershackinghackshardwareIoTmalwareprinterstuxnet (Read more…) The post Explosive…
Chrome extensions that lie about their permissions
Read the original article: Chrome extensions that lie about their permissions Users have learned to review the list of permissions Chrome extensions require before installing them from the webstore. But what’s the use if they lie to you? Categories: PUP…
Dutch ISP Ziggo demonstrates how not to inform your customers about a security flaw
Read the original article: Dutch ISP Ziggo demonstrates how not to inform your customers about a security flaw Dutch ISP Ziggo sent an email to customers about a security flaw that raised several red flags for phishing—despite being legitimate. Learn…
The skinny on the Instacart breach
Read the original article: The skinny on the Instacart breach With the sudden popularity of grocery and pick-up services in this pandemic era, online criminals were swift to target and compromise Instacart. How did it happen? Categories: Hacking Tags: credential…
SBA phishing scams: from malware to advanced social engineering
Read the original article: SBA phishing scams: from malware to advanced social engineering SBA loan scams continue to make the rounds targeting small business owners, CEOS, and CFOs. Learn what to look out for. Categories: Scams Tags: loanphishingSBAscam (Read more…)…
A week in security (August 3 – 9)
Read the original article: A week in security (August 3 – 9) A roundup of cybersecurity news from August 3 – 9, including a look at business email compromises, a new data privacy bill, and the Inter skimming attack. Categories:…
Inter skimming kit used in homoglyph attacks
Read the original article: Inter skimming kit used in homoglyph attacks Threat actors load credit card skimmers using a known phishing technique called homoglyph attacks. Categories: Threat analysis Tags: credit card skimminghomoglyphInterkitMagecartskimmersskimming (Read more…) The post Inter skimming kit used…
Data Accountability and Transparency Act of 2020 looks beyond consent
Read the original article: Data Accountability and Transparency Act of 2020 looks beyond consent The Data Accountability and Transparency Act proposes that, for American consumers, privacy shouldn’t be a right you can click away. Categories: Privacy Tags: consentData Accountability and…
Business email compromise: gunning for goal
Read the original article: Business email compromise: gunning for goal We look at the latest happenings in the world of business email compromise (BEC). Categories: Cybercrime Social engineering Tags: becbusiness cybersecurityBusiness Email CompromiseCEO scamCFO fraudemailmail (Read more…) The post Business…
Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks
Read the original article: Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks Read more…) The post Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks appeared first on Malwarebytes Labs. …
Avoid these PayPal phishing emails
Read the original article: Avoid these PayPal phishing emails We cover some recent PayPal phish mails and link to anti-phish resources. Categories: Cybercrime Social engineering Tags: account is limitedintl-limitedPayPalphishphishingscam (Read more…) The post Avoid these PayPal phishing emails appeared first…
Malspam campaign caught using GuLoader after service relaunch
Read the original article: Malspam campaign caught using GuLoader after service relaunch We discovered a spam campaign distributing GuLoader in the aftermath of the service’s relaunch Categories: Malware Threat analysis Tags: GuLoadermalspammalwarespamstealer (Read more…) The post Malspam campaign caught using…
Cloud workload security: Should you worry about it?
Read the original article: Cloud workload security: Should you worry about it? While the cloud workload is growing at a rapid pace, isn’t it time to start worrying about securing it? Categories: Business Tags: application layercloudcloud resourcescloud workload securitycontainerizationdatahypervisor layersecure-by-designsecurity…
TikTok is being discouraged and the app may be banned
Read the original article: TikTok is being discouraged and the app may be banned Companies and organizations are dicouraging their employees to use TikTok, especially on work related devices. Will TikTok face a ban? Categories: Privacy Tags: amazonAustraliabanbytedancechinaindiaprivacyredditsocial mediatiktokusa (Read…
A week in security (July 20 – 26)
Read the original article: A week in security (July 20 – 26) A roundup of cybersecurity news from July 20 – 26, including Deepfakes, Bluetooth technology, and APT groups. Categories: A week in security Tags: a week in securityadvanced persistent…
Deepfakes or not: new GAN image stirs up questions about digital fakery
Read the original article: Deepfakes or not: new GAN image stirs up questions about digital fakery We look at the latest splash of synthetic human deepfakes shenanigans working their way into mainstream news in order to cause disruption. Categories: Social…
New Deepfakes using GAN stirs up questions about digital fakery
Read the original article: New Deepfakes using GAN stirs up questions about digital fakery We look at the latest splash of synthetic human deepfakes shenanigans working their way into mainstream news in order to cause disruption. Categories: Social engineering Tags:…
EncroChat system eavesdropped on by law enforcement
Read the original article: EncroChat system eavesdropped on by law enforcement Dutch law enforcement cracked the encryption on EncroChat, a secure messaging platform popular with criminals, and made hundreds of arrests. But is this a dangerous precedent? Categories: Hacking Tags:…
Chinese APT group targets India and Hong Kong using new variant of MgBot malware
Read the original article: Chinese APT group targets India and Hong Kong using new variant of MgBot malware We uncovered an active campaign in early July that we attribute to a new Chinese APT group attacking India and Hong Kong…
Lock and Code S1Ep11: Locating concerns of Bluetooth and beacon technology with Chris Boyd
Read the original article: Lock and Code S1Ep11: Locating concerns of Bluetooth and beacon technology with Chris Boyd This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In…
It’s baaaack: Public cyber enemy Emotet has returned
Read the original article: It’s baaaack: Public cyber enemy Emotet has returned Read more…) The post It’s baaaack: Public cyber enemy Emotet has returned appeared first on Malwarebytes Labs. Advertise on IT Security News. Read the original article: It’s…
How exposed are you to cybercrime?
Read the original article: How exposed are you to cybercrime? Passwordmanagers.co measures exposure to cybercrime by weighing risk of cyberattack against an organization’s security preparedness. How exposed are you? Categories: Cybercrime Tags: cybercrimecybercrime exposurecybersecurity exposure indexcybersecurity hygieneexposure ratepassword managerpassword managers…
Coordinated Twitter attack rakes in 100 grand
Read the original article: Coordinated Twitter attack rakes in 100 grand In a social engineering attack on Twitter, threat actors managed to scam $100,000 dollars in Bitcoin by taking over high-profile accounts. Categories: Social engineering Tags: 2fabitcoinSocial Engineeringtweetstwitterverified accounts (Read…
Website misconfigurations and other errors to avoid
Read the original article: Website misconfigurations and other errors to avoid Website misconfigurations can lead to hacking, malfunction, and worse. We take a look at recent mishaps and advise site owners on how to lock down their platforms. Categories: How-tos…
Stalkerware advertising ban by Google a welcome, if incomplete, step
Read the original article: Stalkerware advertising ban by Google a welcome, if incomplete, step Google will no longer allow advertising of stalkerware and spyware tools, but a written exception could allow some companies to skirt the rules. Categories: Stalkerware Tags:…
A week in security (July 6 – 12)
Read the original article: A week in security (July 6 – 12) A roundup of cybersecurity news from July 6 – 12, including a look at pre-installed malware on some Android phones, and a Mac malware mystery. Categories: A week…
Threat spotlight: WastedLocker, customized ransomware
Read the original article: Threat spotlight: WastedLocker, customized ransomware WastedLocker ransomware, attributed to the Russian Evil Corp gang, is such a targeted threat, you might call it a custom-built ransomware family. Categories: Threat spotlight Tags: evil corpRansom.BinADSransomwarewastedwastedlocker (Read more…) The…
We found yet another phone with pre-installed malware via the Lifeline Assistance program
Read the original article: We found yet another phone with pre-installed malware via the Lifeline Assistance program We discovered yet another phone model with pre-installed malware provided from the Lifeline Assistance program via Assurance Wireless by Virgin Mobile. Categories: Android…
We found yet another phone with pre-installed malware via the Lifeline Assistance program
Read the original article: We found yet another phone with pre-installed malware via the Lifeline Assistance program We discovered yet another phone model with pre-installed malware provided from the Lifeline Assistance program via Assurance Wireless by Virgin Mobile. Categories: Android…
Mac ThiefQuest malware may not be ransomware after all
Read the original article: Mac ThiefQuest malware may not be ransomware after all We discovered a new Mac malware, ThiefQuest, that appeared to be ransomware at first glance. However, once we dug in deeper, we found out its true identity—and…
Lock and Code S1Ep10: Pulling apart the Internet of Things with JP Taggart
Read the original article: Lock and Code S1Ep10: Pulling apart the Internet of Things with JP Taggart This week on Lock and Code, we talk to JP Taggart, senior security researcher at Malwarebytes, about the Internet of Things. Categories: Podcast…
Credit card skimmer targets ASP.NET sites
Read the original article: Credit card skimmer targets ASP.NET sites This unusual web skimmer campaign goes after sites running Microsoft’s IIS servers with an outdated version of the ASP.NET framework. Categories: Threat analysis Tags: ASP.netcredit cardcredit card skimmercredit card skimmingdigital…
Do Chromebooks need antivirus protection?
Read the original article: Do Chromebooks need antivirus protection? You may have heard that installing a Chromebook antivirus program is unnecessary. We take a look at the Chromebook’s security features and weigh in on whether that’s true. Categories: Opinion Tags:…
New Mac ransomware spreading through piracy
Read the original article: New Mac ransomware spreading through piracy We analyze a new Mac ransomware that appears to encrypt user files with a bit of a time delay. Categories: Mac Tags: AbletonAbleton LiveencryptFindzipFindzip ransomwareLittle Snitchmacmac malwareMixed In Keyransomwaretime delay…
Bluetooth beacons: one free privacy debate with your next order
Read the original article: Bluetooth beacons: one free privacy debate with your next order We take a look at Bluetooth beacons and their role behind the scenes in many real-world marketing campaigns—whether you’re aware of it or not. Categories: Privacy…
A week in security (June 22 – 28)
Read the original article: A week in security (June 22 – 28) A roundup of cybersecurity news from June 22 – 28, inlcuding a zero day guide, tax season tips, and web skimmers using image files. Categories: A week in…
The face of tomorrow’s cybercrime: Deepfake ransomware explained
Read the original article: The face of tomorrow’s cybercrime: Deepfake ransomware explained Deepfake ransomware is a mighty combination that several security experts fear would happen soon. But what is it exactly? Is it deepfake with a ransomware twist? Or ransomware…
Web skimmer hides within EXIF metadata, exfiltrates credit cards via image files
Read the original article: Web skimmer hides within EXIF metadata, exfiltrates credit cards via image files This credit card skimmer hides in plain sight, quite literally, as it resides inside the metadata of image files. Categories: Threat analysis Tags: EXIFMagecartmetadataskimmersskimming…
Coughing in the face of scammers: security tips for the 2020 tax season
Read the original article: Coughing in the face of scammers: security tips for the 2020 tax season In spite of everything happening in the world, taxes are due in the US. Here are some tips to protect your personal info…
A zero-day guide for 2020: Recent attacks and advanced preventive techniques
Read the original article: A zero-day guide for 2020: Recent attacks and advanced preventive techniques Zero-day vulnerabilities—and their potential, related attacks—can drive any security team mad. Here’s how you can bulk up your defenses. Categories: Exploits and vulnerabilities Tags: artificial…
Lock and Code S1Ep9: Strengthening and forgetting passwords with Matt Davey and Kyle Swank
Read the original article: Lock and Code S1Ep9: Strengthening and forgetting passwords with Matt Davey and Kyle Swank On Lock and Code, we talk to Matt Davey and Kyle Swank of 1Password about secure passwords, alternatives to passwords, and the…
Facial recognition: tech giants take a step back
Read the original article: Facial recognition: tech giants take a step back Some of the big players in the field of facial recognition announced they will not provide their technology to law enforcement while there is no governing law. Categories:…
Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature
Read the original article: Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature A newly discovered APT spear-phishing attack implements several evasion techniques to drop Cobalt Strike toolkit. Categories: Malware Threat analysis Tags: APTC2cobalt strikeMalleable C2 (Read more…) The…
End of line: supporting IoT in the home
Read the original article: End of line: supporting IoT in the home Warranties which may not warranty, certificates which might fail to certify, lifespans which don’t match the length of cover promised. This could be IoT. Categories: Cybercrime Privacy Tags:…
VPNs: should you use them?
Read the original article: VPNs: should you use them? We’ve been getting questions about VPNs that are more advanced than before. It isn’t so much what a VPN is, as it is whether people should use them. Categories: Malwarebytes news…
A week in security (June 8 – 14)
Read the original article: A week in security (June 8 – 14) A roundup of news and blog posts from the week of June 8 – 14, including the Honda ransomware attack, search hijackers, and what to look for in…
Search hijackers change Chrome policy to remote administration
Read the original article: Search hijackers change Chrome policy to remote administration Search hijackers are always looking for ways to get and stay installed. Here is one that changed a Chrome policy and set it to remote administration. Categories: Threat…
MSPs, know what you’re really looking for in an RMM platform
Read the original article: MSPs, know what you’re really looking for in an RMM platform When ransomware targeting MSPs began making headlines, things started to change. This also made MSPs assess their current RMM platform and, should they decide to…
Honda and Enel impacted by cyber attack suspected to be ransomware
Read the original article: Honda and Enel impacted by cyber attack suspected to be ransomware Car manufacturer Honda has been hit by a cyber attack, according to a report published by the BBC, and later confirmed by the company in…
ParetoLogic facing complaint of alleged wrongdoing
Read the original article: ParetoLogic facing complaint of alleged wrongdoing After Revenuewire settled with the FTC, its sister company ParetoLogic has to appear in court. They are sued in a US class-action by a disgruntled customer. Categories: Tech support scams…
Lock and Code S1Ep8: Securely working from home (WFH) with John Donovan and Adam Kujawa
Read the original article: Lock and Code S1Ep8: Securely working from home (WFH) with John Donovan and Adam Kujawa On Lock and Code, we talk to Malwarebytes head of security John Donovan, Malwarebytes Labs director Adam Kujawa about securely working…
New LNK attack tied to Higaisa APT discovered
Read the original article: New LNK attack tied to Higaisa APT discovered We describe a new spearphishing campaign tied to the potential North Korean Higaisa APT group. Categories: Malware Threat analysis Tags: APTHigaisakoreaLNKPlugXrat (Read more…) The post New LNK attack…
Sodinokibi ransomware gang auctions off stolen data
Read the original article: Sodinokibi ransomware gang auctions off stolen data The Sodinokibi ransomware operators have opened an auction site to sell the stolen data of their victims to the highest bidder. Categories: Ransomware Tags: auctionhappy blogransomransomwareSodinokibi (Read more…) The…
Teaching from home might become part of every teachers’ job description
Read the original article: Teaching from home might become part of every teachers’ job description Read more…) The post Teaching from home might become part of every teachers’ job description appeared first on Malwarebytes Labs. Advertise on IT Security…
A brief history of video game saves and data modification
Read the original article: A brief history of video game saves and data modification We look at a history of saving game data in video games, and how it usually provides modders and hackers with the best chance of tampering…
Coronavirus campaigns lead to surge in malware threats, Labs report finds
Read the original article: Coronavirus campaigns lead to surge in malware threats, Labs report finds Our latest, special edition for our quarterly CTNT report focuses on recent, increased malware threats which all have one, big thing in common—using coronavirus as…
A week in security (May 25 – 31)
Read the original article: A week in security (May 25 – 31) A roundup of news and blog posts from the week of May 25 – 31 Categories: A week in security Tags: awiscybrsecurityfakefake newsfraudmalwarenewspandemicroundupscamweek in security (Read more…) The…
Maze: the ransomware that introduced an extra twist
Read the original article: Maze: the ransomware that introduced an extra twist Maze ransomware attacks featured the first group of cyber-criminals to add the threat of publishing exfiltrated data to the ransomware business model Categories: Threat spotlight Tags: dataFalloutMazepulseransomwareSpelevovpn (Read…
The best test for an EDR solution is one that works for you
Read the original article: The best test for an EDR solution is one that works for you Since its inception, the endpoint detection and response (EDR) market has evolved rapidly with new innovations to better address the cyber landscape and…
Coalition Against Stalkerware bulks up global membership
Read the original article: Coalition Against Stalkerware bulks up global membership The Coalition Against Stalkerware brought aboard 11 new organizations to address the potentially dangerous capabilities of stalkerware. Categories: Stalkerware Tags: Anonyome LabsAppEsteem Corporationbff Bundesverband Frauenberatungsstellen und FrauennotrufeCentre Hubertine AuclertCoalition…
Lock and Code S1Ep7: Sounding the trumpet on web browser privacy with Pieter Arntz
Read the original article: Lock and Code S1Ep7: Sounding the trumpet on web browser privacy with Pieter Arntz This week on Lock and Code, we talk to Pieter Arntz about web browser privacy—an often neglected subcategory of data privacy. Categories:…
Going dark: encryption and law enforcement
Read the original article: Going dark: encryption and law enforcement There’s been a lot of talk recently about encryption and how law enforcement can’t convict criminals without encryption keys. We beg to differ. Categories: Government Privacy Security world Tags: backdoorDepartment…
Shining a light on “Silent Night” Zloader/Zbot
Read the original article: Shining a light on “Silent Night” Zloader/Zbot The latest Malwarebytes Threat Intel report focuses on Silent Night, a new banking Trojan recently tracked as Zloader/Zbot. Categories: Malware Threat analysis Tags: banking Trojanbanking TrojansHYASsilent nightterdotzbotZeusZloader (Read more…)…
10 best practices for MSPs to secure their clients and themselves from ransomware
Read the original article: 10 best practices for MSPs to secure their clients and themselves from ransomware For MSPs, securing themselves from ransomware is just as much a practice in securing clients. See how to save data—and money—with these best…
When the coronavirus infodemic strikes
Read the original article: When the coronavirus infodemic strikes What are the biggest social media platforms doing to combat the rise in COVID-19 conspiracy theories spreading online? Categories: Scams Tags: archiveconspiracy theoriesconspiracy theorycoronaviruscovid-19facebookinfodemicscamssocial mediaspamtiktoktwittervideosyoutube (Read more…) The post When the…
A week in security (May 11 – May 17)
Read the original article: A week in security (May 11 – May 17) A roundup of the previous week’s security news, including attacks at MobiFriends, Cognizant, WeLeakData, and Magellan Health plus more news. Categories: A week in security Tags: air-gappedcognizantearn…
Sodinokibi drops greatest hits collection, and crime is the secret ingredient
Read the original article: Sodinokibi drops greatest hits collection, and crime is the secret ingredient A major legal firm has been attacked by the Sodinokibi gang. What happened? Categories: Cybercrime Hacking Tags: lady gagalegalmadonnamalwaremusicransomwaresodinokibi ransomware (Read more…) The post Sodinokibi…
How CVSS works: characterizing and scoring vulnerabilities
Read the original article: How CVSS works: characterizing and scoring vulnerabilities CVSS, or Common Vulnerability Scoring System, provides developers, testers, and security professionals with a standardized process to assess vulnerabilities. Categories: Malwarebytes news Tags: attack complexityattack vectorbug bountycommon vulnerability scoring…
RevenueWire to pay $6.7 million to settle FTC charges
Read the original article: RevenueWire to pay $6.7 million to settle FTC charges The FTC filed a complaint against payment provider RevenueWire and its CEO for laundering credit card payments and facilitating and assisting in fraud. Categories: Tech support scams…
Lock and Code S1Ep6: Recognizing facial recognition’s flaws with Chris Boyd
Read the original article: Lock and Code S1Ep6: Recognizing facial recognition’s flaws with Chris Boyd Read more…) The post Lock and Code S1Ep6: Recognizing facial recognition’s flaws with Chris Boyd appeared first on Malwarebytes Labs. Advertise on IT Security…
Data privacy law updates eyed by Singapore
Read the original article: Data privacy law updates eyed by Singapore Data privacy updates—including data portability and a data breach notification requirement—are being considered by Singapore’s government. Categories: Malwarebytes news Privacy Tags: CaliforniaCalifornia Consumer Privacy Actdata breach notificationdata breach notification…
New Mac variant of Lazarus Dacls RAT distributed via Trojanized 2FA app
Read the original article: New Mac variant of Lazarus Dacls RAT distributed via Trojanized 2FA app The Lazarus group improves their toolset with a new RAT specifically designed for the Mac. Categories: Mac Malware Threat analysis Tags: APTDaclsLazarusmacmalwarerattinkaOTP (Read more…)…
Credit card skimmer masquerades as favicon
Read the original article: Credit card skimmer masquerades as favicon Criminals register fake domain to hide their web skimmer as an innocuous image file. Categories: Threat analysis Tags: ants and cockroachcredit carcredit card skimmerfaviconMagecartmagentoskimmer (Read more…) The post Credit card…
Explained: cloud-delivered security
Read the original article: Explained: cloud-delivered security What is cloud delivered security aka security as a service? Is it something that can benefit your organization? There’s a good chance that it might. Categories: Explained Tags: cloudiaasidentity managementMSPpaassaassmaller businesses (Read more…)…
A week in security (April 27 – May 3)
Read the original article: A week in security (April 27 – May 3) A roundup of the previous week’s security news, including cloud data protection, Troldesh, VPNs, the cybercrime economy, and more. Categories: Malwarebytes news Tags: AppleAPTawisbluetoothbluetooth attackBluetooth vulnerabilitiesCivicSmartcloud securitycoronaviruscovid-19hackedhospitalsJITjust…
What to do when you receive an extortion email
Read the original article: What to do when you receive an extortion email Extortion emails are nothing new, but with the recent increase in frequency, many people are looking for guidance. If you have received such a message and want…
What to do when you receive an extortion e-mail
Read the original article: What to do when you receive an extortion e-mail xtortion e-mails are nothing new, but with the recent increase in frequency, many people are looking for guidance. If you have received such an e-mail message and…
Cybersecurity and the economy: when recession strikes
Read the original article: Cybersecurity and the economy: when recession strikes Could a recession brought on by the current COVID-19 pandemic cause an increase in cybercrime? Did cybercrime increase during the recession of 2009? Or is this just too complex…
VPNs are mainstream, which is good news
Read the original article: VPNs are mainstream, which is good news According to a recent report, the use of virtual private networks (VPNs) has been on a steady growth since 2017. During this coronavirus season, that growth has been palpable—but…
Threat actors release Troldesh decryption keys
Read the original article: Threat actors release Troldesh decryption keys On GitHub a user called shade-team released hundreds of thousands of Troldesh decryption keys. Can victims of the ransomware safely use them to decrypt their files? Categories: Ransomware Tags: decryption…
Switching from a “Just in Time” delivery system should include planning ahead
Read the original article: Switching from a “Just in Time” delivery system should include planning ahead Imminent changes in the software organizations are using will come with security implications. How can organizations prepare for the future? Categories: Security world Tags:…
Cloud data protection: how to secure what you store in the cloud
Read the original article: Cloud data protection: how to secure what you store in the cloud With robust security measures and a healthy dose of general internet safety guidelines, cloud storage can be as secure as any other option on…
Lock and Code S1Ep5: Mythbusting and understanding VPNs with JP Taggart
Read the original article: Lock and Code S1Ep5: Mythbusting and understanding VPNs with JP Taggart This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk…
Introducing Malwarebytes Privacy
Read the original article: Introducing Malwarebytes Privacy It’s important to use a VPN you can trust to protect your privacy on the Internet. That’s why we launched Malwarebytes Privacy, a next-gen VPN for better privacy, performance, and security when you…
iOS Mail bug allows remote zero-click attacks
Read the original article: iOS Mail bug allows remote zero-click attacks A newly-discovered vulnerability in iOS Mail can be used to attack an iPhone remotely using a malicious e-mail message, even if you’re running the latest version of iOS (13.4.1).…
The passwordless present: Will biometrics replace passwords forever?
Read the original article: The passwordless present: Will biometrics replace passwords forever? The effectiveness of passwords to protect data has long been debated. Many have called for the death of passwords, instead pushing for biometrics to secure their most precious…
A week in security (April 13 – 19)
Read the original article: A week in security (April 13 – 19) A roundup of the previous week’s security news, including phishing scams, coronavirus scams, Apple scams, and more. Categories: A week in security Tags: adwareAndroidcoronavirusmalwarephishweek in securityweekly roundup (Read…
Discord users tempted by bots offering “free Nitro games”
Read the original article: Discord users tempted by bots offering “free Nitro games” We look at a wave of bots promoting free games on Discord. But is everything as it seems? Categories: Cybercrime Tags: botsdiscordgamingspamstreamingtwitchvideogames (Read more…) The post Discord…
New AgentTesla variant steals WiFi credentials
Read the original article: New AgentTesla variant steals WiFi credentials The popular infostealer AgentTesla recently added a new feature that can steal WiFi usernames and passwords. Categories: Cybercrime Malware Tags: Agent Teslamalwarewifi (Read more…) The post New AgentTesla variant steals…
Mass surveillance alone will not save us from coronavirus
Read the original article: Mass surveillance alone will not save us from coronavirus As governments roll out enormous data collection programs to limit coronavirus, we should remember that mass surveillance alone will not save us. Categories: Opinion Tags: AppleAustriabluetoothBluetooth contact…
Keep Zoombombing cybercriminals from dropping a load on your meetings
In a zeitgeisty moment, Zoom has become the web conference tool of choice for everyone. Unfortunately, cybercriminals are taking note and Zoombooming the public. We show readers how to protect against this intrusion of privacy. Categories: How-tos Tags: coronaviruscovid-19exploitexploitshow-to zoomteleconferencingvirtual…
Lock and Code S1Ep4: coronavirus and responding to computer viruses with Akshay Bhargava
We cover the week’s security headlines plus talk with Malwarebytes CPO Akshay Bhargava about the similarities in responding to computer viruses vs. real-life pandemics in episode 4 of Lock and Code. Categories: Podcast Tags: Androidbad appscomputer viruscoronaviruscovid-19detection and responselock and…
APTs and COVID-19: How advanced persistent threats use the coronavirus as a lure
We review the top APT groups taking advantage of the current pandemic. Categories: Threat analysis Tags: advanced persistent threatsAPTscovid-19malware (Read more…) The post APTs and COVID-19: How advanced persistent threats use the coronavirus as a lure appeared first on Malwarebytes…