How we can stop the New Mafia’s digital footprint from spreading in 2018

Credit to Author: Marcin Kleczynski| Date: Thu, 07 Dec 2017 15:00:28 +0000

Cybercriminals are the New Mafia of today’s world. This new generation of hackers are like traditional Mafia organizations, not just in their professional coordination, but their ability to intimidate and paralyze victims.

Categories:

Tags:

(Read more…)

The post How we can stop the New Mafia’s digital footprint from spreading in 2018 appeared first on Malwarebytes Labs.

Read more

Use TeamViewer? Fix this dangerous permissions bug with an update

Credit to Author: Malwarebytes Labs| Date: Wed, 06 Dec 2017 19:42:54 +0000

A potentially dangerous permissions bug in TeamViewer grants unauthorised access to either the client or the server—and patches may take up to a week to fully roll out.

Categories:

Tags:

(Read more…)

The post Use TeamViewer? Fix this dangerous permissions bug with an update appeared first on Malwarebytes Labs.

Read more

Children and young adults: the next-generation money mules

Credit to Author: Malwarebytes Labs| Date: Tue, 05 Dec 2017 16:00:32 +0000

Money laundering predates the Internet. But today’s interconnectedness has made it a lot easier for criminals to lure unsuspecting users into becoming money mules. Their latest victims: children and young adults.

Categories:

Tags:

(Read more…)

The post Children and young adults: the next-generation money mules appeared first on Malwarebytes Labs.

Read more

PayPal phish asks to verify transactions—don’t do it

Credit to Author: Christopher Boyd| Date: Fri, 01 Dec 2017 19:35:26 +0000

We take a look at a batch of fake PayPal emails asking potential victims to visit a so-called resolution center to address unverified transactions.

Categories:

Tags:

(Read more…)

The post PayPal phish asks to verify transactions—don’t do it appeared first on Malwarebytes Labs.

Read more

Persistent drive-by cryptomining coming to a browser near you

Credit to Author: Jérôme Segura| Date: Wed, 29 Nov 2017 18:00:10 +0000

If you think closing your browser window to leave a site that runs a cryptominer will stop the mining process, think again. Persistent drive-by cryptomining has arrived.

Categories:

Tags:

(Read more…)

The post Persistent drive-by cryptomining coming to a browser near you appeared first on Malwarebytes Labs.

Read more

Serious macOS vulnerability exposes the root user

Credit to Author: Thomas Reed| Date: Wed, 29 Nov 2017 16:00:02 +0000

A major macOS vulnerability in High Sierra was reported. Anyone can log in as “root” with an empty password. Learn more.

Categories:

Tags:

(Read more…)

The post Serious macOS vulnerability exposes the root user appeared first on Malwarebytes Labs.

Read more

Please don’t buy this: identity theft protection services

Credit to Author: William Tsing| Date: Tue, 28 Nov 2017 17:31:58 +0000

Identity theft protection services promise to have your back against cybercriminals looking to steal your data. But they don’t actually stop them from taking your identity. Are they worth it, then? We say no.

Categories:

Tags:

(Read more…)

The post Please don’t buy this: identity theft protection services appeared first on Malwarebytes Labs.

Read more

Mobile Menace Monday: Chrome declares war on unwanted redirects

Credit to Author: Gleb Malygin| Date: Mon, 27 Nov 2017 16:30:33 +0000

Google initiates their plans to implement new changes in Chrome to defend against annoying web redirects.

Categories:

Tags:

(Read more…)

The post Mobile Menace Monday: Chrome declares war on unwanted redirects appeared first on Malwarebytes Labs.

Read more

Uber: How Not To Handle A Breach

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 22 Nov 2017 17:18:01 +0000

Uber is a company that is embattled on all fronts. From a very public power struggle to labour issues to regulatory challenges to a reportedly toxic culture, Uber sits in a precarious position. Yesterday, a new strike against the company came to light. In October 2016, Uber was hacked resulting in the exposure of 57…

Read more

Text messages and the Bitcoin Code: follow the money trail

Credit to Author: Christopher Boyd| Date: Tue, 21 Nov 2017 16:00:00 +0000

Text messages are being sent around claiming recipients are in possession of a Bitcoin. That would be quite a lot of free money…if it were true. Instead you get the Bitcoin Code, a dodgy trading site we recommend staying far away from.

Categories:

Tags:

(Read more…)

The post Text messages and the Bitcoin Code: follow the money trail appeared first on Malwarebytes Labs.

Read more

When you shouldn’t trust a trusted root certificate

Credit to Author: Pieter Arntz| Date: Thu, 16 Nov 2017 17:30:00 +0000

A trusted root certificate is the cornerstone of authentication and security in software and on the Internet. But even this can be abused by criminals. Learn when you shouldn’t trust these trusted sources.

Categories:

Tags:

(Read more…)

The post When you shouldn’t trust a trusted root certificate appeared first on Malwarebytes Labs.

Read more