Security

MalwareBytesSecurity

Fileless malware: part deux

Credit to Author: Vasilios Hioureas| Date: Fri, 05 Oct 2018 15:00:00 +0000

In part two of this series on fileless malware, our malware analyst walks readers through two demonstrations of fileless malware attacks and shows the problems with detecting them using static signatures.

Categories:

Tags:

(Read more…)

The post Fileless malware: part deux appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

LoJack for computers used to attack European government bodies

Credit to Author: Malwarebytes Labs| Date: Thu, 04 Oct 2018 15:00:00 +0000

Security researchers have detected the first known instance of a UEFI bootkit being used against government bodies in Central and Eastern Europe. The attack relies on a persistence mechanism stolen from a legitimate software called Computrace—essentially LoJack for computers—that comes by default on many machines.

Categories:

Tags:

(Read more…)

The post LoJack for computers used to attack European government bodies appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Bring your own security (BYOS): good idea or not?

Credit to Author: Pieter Arntz| Date: Tue, 02 Oct 2018 15:00:00 +0000

We know about BYOD. What about BYOS? Is it a good idea to Bring Your Own Security, or use your own security solution on devices that you use for work? What if they are company owned? We walk companies and employees through the pros and cons of each.

Categories:

Tags:

(Read more…)

The post Bring your own security (BYOS): good idea or not? appeared first on Malwarebytes Labs.

Read More