cybercrime

SecurityTrendMicro

Pawn Storm: The Power of Social Engineering

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 25 Apr 2017 12:00:02 +0000

Anyone familiar with Pawn Storm (a.k.a. APT28, Fancy Bear, Strontium, etc.) is likely to associate the group with highly sophisticated targeted attacks that compromise government and media agencies around the world. In our latest report, researchers expose the true nature and scope of the cyber espionage group’s attacks and methodologies. Pawn Storm has managed to…

Read More
MalwareBytesSecurity

Mobile Menace Monday: Securing your privacy on Android

Credit to Author: Nathan Collier| Date: Mon, 24 Apr 2017 15:00:31 +0000

If you work at a company that allows you to use your mobile device to login email, access company data, and/or connect to company Wi-Fi, you could be more of a risk than you think.

Categories:

Tags:

(Read more…)

The post Mobile Menace Monday: Securing your privacy on Android appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Locky ransomware is back, but we already protect against it

Credit to Author: Malwarebytes Labs| Date: Fri, 21 Apr 2017 23:38:53 +0000

For a while, it appeared that Locky ransomware had completely disappeared and allowed for Cerber to take the number one spot as the most distributed piece of ransomware. But after a long absence, Locky returns in full swing.

Categories:

Tags:

(Read more…)

The post Locky ransomware is back, but we already protect against it appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

ShadowBrokers releases more stolen information

Credit to Author: Adam McNeil| Date: Fri, 14 Apr 2017 18:03:09 +0000

ShadowBrokers shocked the security world again today by releasing another cache of exploits, files, and operational documents purportedly stolen from Equation Group last summer. As you may recall from our earlier publications, Equation Group is reportedly a clandestine hacking group that has been linked with NSA hacking tools.

Categories:

Tags:

(Read more…)

The post ShadowBrokers releases more stolen information appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Amazon third party sellers: A new threat

Credit to Author: William Tsing| Date: Fri, 14 Apr 2017 15:00:06 +0000

On Monday, the Wall Street Journal reported a wave of hijacked Amazon seller accounts that proceeded to fleece buyers for large sums of money. As reported here, attackers would use credentials harvested from other breaches to take over the account, then either simply redirect funds to their own deposit account or create lots of fake…

Categories:

Tags:

(Read more…)

The post Amazon third party sellers: A new threat appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

Why Scammers Want Your Tax Returns (and how to stop them)

Credit to Author: Jon Clay| Date: Thu, 13 Apr 2017 12:00:02 +0000

Hackers very often have to handle a lot of money, and keep it away from the authorities.It’s almost here – April 18, tax day in the U.S. As businesses and employees prepare their tax returns, cybercriminals are once again ramping up efforts to steal this information, and they are getting more intelligent every year.    How it works Business Email Compromise (BEC) scams have been on the rise since 2016, and…

Read More
MalwareBytesSecurity

Report: Cybercrime climate shifts dramatically in first quarter

Credit to Author: Malwarebytes Labs| Date: Thu, 13 Apr 2017 09:00:09 +0000

The first quarter of 2017 brought with it some significant changes to the threat landscape and we aren’t talking about heavy ransomware distribution either. Threats which were previously believed to be serious contenders this year have nearly vanished entirely, while new threats and infection techniques have forced the security community to reconsider collection and analysis efforts.

Categories:

Tags:

(Read more…)

The post Report: Cybercrime climate shifts dramatically in first quarter appeared first on Malwarebytes Labs.

Read More