cybercrime

MalwareBytesSecurity

Under the hoodie: why money, power, and ego drive hackers to cybercrime

Credit to Author: Wendy Zamora| Date: Wed, 15 Aug 2018 14:00:00 +0000

We know what cybercriminals do. We know how they do it. Now we ask: why? This in-depth profile examines what makes hackers turn to cybercrime, and what could change their minds.

Categories:

Tags:

(Read more…)

The post Under the hoodie: why money, power, and ego drive hackers to cybercrime appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (August 6 – August 12)

Credit to Author: Malwarebytes Labs| Date: Mon, 13 Aug 2018 16:37:10 +0000

A round-up of the security news from August 6 – August 12, including ransomware, interesting talks during BlackHat, botnets, and the evils of JavaScript.

Categories:

Tags:

(Read more…)

The post A week in security (August 6 – August 12) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (August 6 – 12)

Credit to Author: Malwarebytes Labs| Date: Mon, 13 Aug 2018 16:37:10 +0000

A round-up of the security news from August 6 – 12, including ransomware, interesting talks during BlackHat, botnets, and the evils of JavaScript.

Categories:

Tags:

(Read more…)

The post A week in security (August 6 – 12) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

White hat, black hat, and the emergence of the gray hat: the true costs of cybercrime

Credit to Author: Malwarebytes Labs| Date: Wed, 08 Aug 2018 14:00:00 +0000

Osterman Research recently completed a major survey on behalf of Malwarebytes to determine the actual cost of cybercrime to businesses. Here’s what we discovered.

Categories:

Tags:

(Read more…)

The post White hat, black hat, and the emergence of the gray hat: the true costs of cybercrime appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

A Look at Scan4You and the Counter Antivirus Service Landscape

Credit to Author: Jon Clay (Global Threat Communications)| Date: Thu, 02 Aug 2018 17:30:09 +0000

The concept of antivirus (AV) scanning within IT security is simple and effective. These programs, which have become part and parcel of typical infrastructure and data protection strategies, scan enterprise networks for known malware signatures and other processes associated with suspicious hacker activity. If and when these signatures or processes are detected, the antivirus program…

The post A Look at Scan4You and the Counter Antivirus Service Landscape appeared first on .

Read More
MalwareBytesSecurity

Social engineering attacks: What makes you susceptible?

Credit to Author: Jovi Umawing| Date: Thu, 02 Aug 2018 15:00:00 +0000

Cybercriminals will do what it takes to get what they want, whether that’s breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here’s how to tell if you’re susceptible to social engineering attacks, and what to do to combat them.

Categories:

Tags:

(Read more…)

The post Social engineering attacks: What makes you susceptible? appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

What’s in the spam mailbox this week?

Credit to Author: Christopher Boyd| Date: Tue, 31 Jul 2018 15:00:27 +0000

We take a look at a few of the most notable spam emails in circulation over the last week, including a money muling scam, Apple phishes, and a sexploitation message featuring old, but real, passwords.

Categories:

Tags:

(Read more…)

The post What’s in the spam mailbox this week? appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

New Android P includes several security improvements

Credit to Author: Gleb Malygin| Date: Fri, 27 Jul 2018 19:12:28 +0000

With its release around the corner, we take a close look at the Android P security improvements and how the newest version of Android will better protect the privacy and data of its users.

Categories:

Tags:

(Read more…)

The post New Android P includes several security improvements appeared first on Malwarebytes Labs.

Read More