cybercrime

MalwareBytesSecurity

Trojans: What’s the real deal?

Credit to Author: Christopher Boyd| Date: Wed, 25 Jul 2018 15:40:47 +0000

We take a fresh look at Trojans: the history of the term, the most popular threats over the years, the different types of Trojans, and their relationship with social engineering.

Categories:

Tags:

(Read more…)

The post Trojans: What’s the real deal? appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Mobile Menace Monday: Adware MobiDash gets stealthy

Credit to Author: Nathan Collier| Date: Mon, 23 Jul 2018 15:00:50 +0000

Adware MobiDash, an ad-displaying nuisance, now comes with some additional stealth features. As a result, these features hide the existence of Adware MobiDash—even when it’s in plain sight.

Categories:

Tags:

(Read more…)

The post Mobile Menace Monday: Adware MobiDash gets stealthy appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Cybercrime tactics & techniques Q2 2018

Credit to Author: Malwarebytes Labs| Date: Tue, 17 Jul 2018 12:05:00 +0000

The last quarter is likely the last hurrah of the campaigns and attacks we’ve been seeing over the last 6 months. What comes next may completely change the game. Check out our latest Cybercrime Tactics & Techniques report to find out more about what you may encounter next quarter.

Categories:

Tags:

(Read more…)

The post Cybercrime tactics & techniques Q2 2018 appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

We block shady ad blockers

Credit to Author: Malwarebytes Labs| Date: Wed, 11 Jul 2018 18:15:23 +0000

Some of you have reached out to us concerning Malwarebytes blocking of certain Ad blocking extensions, or an influx in web blocking notifications.  First things first, this is not a False Positive. 

Categories:

Tags:

(Read more…)

The post We block shady ad blockers appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

IoT domestic abuse: What can we do to stop it?

Credit to Author: Christopher Boyd| Date: Wed, 11 Jul 2018 15:00:00 +0000

A disturbing new use of technology against loved ones has come to light: Internet of Things (IoT) domestic abuse cases are being reported, and security experts are wondering how best to tackle this new problem. What is it? And more importantly, what can we do to fight it?

Categories:

Tags:

(Read more…)

The post IoT domestic abuse: What can we do to stop it? appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Major data breaches at Adidas, Ticketmaster pummel web users

Credit to Author: Christopher Boyd| Date: Fri, 29 Jun 2018 18:00:42 +0000

There’s been a number of major data breaches and leaks revealed in the last few days, and we take a look at three of the biggest: Adidas, Ticketmaster, and marketing firm Exactis.

Categories:

Tags:

(Read more…)

The post Major data breaches at Adidas, Ticketmaster pummel web users appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Red Hen website suffers SEO spam compromise

Credit to Author: Christopher Boyd| Date: Wed, 27 Jun 2018 21:11:28 +0000

A website belonging to an eatery currently making waves in the news has been compromised with SEO spam. We take a look at what’s happened, and explain what the hackers are up to.

Categories:

Tags:

(Read more…)

The post Red Hen website suffers SEO spam compromise appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

World Cup 2018: malware attacks gunning for goal

Credit to Author: Christopher Boyd| Date: Wed, 27 Jun 2018 18:29:49 +0000

The World Cup is in full swing, and attackers are busy both on and off the pitch. Which of the competing nations are under fire from malware authors? Who is sailing through qualifying rounds mostly untouched? What are the most popular threats in the midst of the biggest footballing nations? Read on to find out.

Categories:

Tags:

(Read more…)

The post World Cup 2018: malware attacks gunning for goal appeared first on Malwarebytes Labs.

Read More