Mozilla launches Firefox Send for private file sharing

Credit to Author: Christopher Boyd| Date: Thu, 14 Mar 2019 17:37:51 +0000

Mozilla recently launched Firefox Send, a new, secure way to share files from inside your browser. We discuss the pros and cons of this service.

Categories:

Tags:

(Read more…)

The post Mozilla launches Firefox Send for private file sharing appeared first on Malwarebytes Labs.

Read more

Emotet revisited: pervasive threat still a danger to businesses

Credit to Author: Pieter Arntz| Date: Thu, 14 Mar 2019 15:00:00 +0000

Emotet is often mentioned as one of the most annoying, effective, and costly present-day malware infections. We discuss the reasons why and the proper way to remove it.

Categories:

Tags:

(Read more…)

The post Emotet revisited: pervasive threat still a danger to businesses appeared first on Malwarebytes Labs.

Read more

Spectre, Google, and the Universal Read Gadget

Credit to Author: Christopher Boyd| Date: Fri, 01 Mar 2019 16:43:37 +0000

A recently released paper by Google has resurrected the spirit of Spectre, a seemingly never-ending threat to most makes of processor. We take a look at what this means, and what the Universal Read Gadget means for most technology users.

Categories:

Tags:

(Read more…)

The post Spectre, Google, and the Universal Read Gadget appeared first on Malwarebytes Labs.

Read more

Sophisticated phishing: a roundup of noteworthy campaigns

Credit to Author: Malwarebytes Labs| Date: Wed, 20 Feb 2019 19:21:40 +0000

A phishing page that hides behind a translation service. A kit that uses fake font files. A hyper-realistic campaign that could likely fool even the pros. We look at these noteworthy phishing attempts and more to show how far phishers have evolved, and remind users to remain vigilant against this threat.

Categories:

Tags:

(Read more…)

The post Sophisticated phishing: a roundup of noteworthy campaigns appeared first on Malwarebytes Labs.

Read more

A Game of Risk with Broadcasters, Cyber Felons and Dragons

Credit to Author: Trend Micro| Date: Wed, 20 Feb 2019 15:21:50 +0000

Submitted by Steve Ng, Lead, Digital Platform Operations, Mediacorp Where there’s money, there has always been crime. But what if money came in the form of intangible digital assets and crime in the form of cyber adversaries? In fantasy role-playing game Dungeons & Dragons, dragons are intelligent, mythical foes defined by their fiery prowess – boasting…

The post A Game of Risk with Broadcasters, Cyber Felons and Dragons appeared first on .

Read more

Hacker destroys VFEmail service, wipes backups

Credit to Author: Christopher Boyd| Date: Thu, 14 Feb 2019 16:56:00 +0000

A hacker managed to compromise, and entirely destroy, a popular email service and all of its backups. What happened?

Categories:

Tags:

(Read more…)

The post Hacker destroys VFEmail service, wipes backups appeared first on Malwarebytes Labs.

Read more

Sextortion Bitcoin scam makes unwelcome return

Credit to Author: Christopher Boyd| Date: Mon, 11 Feb 2019 18:38:53 +0000

A well-worn sextortion scam is back in user’s inboxes. We explain what to look for and why recipients shouldn’t panic.

Categories:

Tags:

(Read more…)

The post Sextortion Bitcoin scam makes unwelcome return appeared first on Malwarebytes Labs.

Read more

Movie stream ebooks gun for John Wick 3 on Kindle store

Credit to Author: Christopher Boyd| Date: Mon, 04 Feb 2019 17:30:37 +0000

Over the weekend, we observed a clever spam campaign using bogus ebooks dressed as John Wick 3 movie files to push links to streaming sites. Can John and your ability avoid web based scams survive?

Categories:

Tags:

(Read more…)

The post Movie stream ebooks gun for John Wick 3 on Kindle store appeared first on Malwarebytes Labs.

Read more

Sly criminals package ransomware with malicious ransom note

Credit to Author: Malwarebytes Labs| Date: Fri, 25 Jan 2019 18:00:00 +0000

Ransomware is not dead. It’s changing—and we need to be ready for them.

Categories:

Tags:

(Read more…)

The post Sly criminals package ransomware with malicious ransom note appeared first on Malwarebytes Labs.

Read more

Has two-factor authentication been defeated? A spotlight on 2FA’s latest challenge

Credit to Author: Malwarebytes Labs| Date: Mon, 21 Jan 2019 16:15:30 +0000

While many tech-savvy folks are familiar with two-factor authentication (2FA), more are unaware that there are several ways around it. A tactic called Modlishka, the English pronunciation for the Polish word for “mantis,” is the latest in this list.

Categories:

Tags:

(Read more…)

The post Has two-factor authentication been defeated? A spotlight on 2FA’s latest challenge appeared first on Malwarebytes Labs.

Read more