Conti Ransomware Group Diaries, Part IV: Cryptocrime

Credit to Author: BrianKrebs| Date: Tue, 08 Mar 2022 01:38:36 +0000

Three stories here last week pored over several years’ worth of internal chat records stolen from the Conti ransomware group, the most profitable ransomware gang in operation today. The candid messages revealed how Conti evaded law enforcement and intelligence agencies, what it was like on a typical day at the Conti office, and how Conti secured the digital weaponry used in their attacks. This final post on the Conti conversations explores different schemes that Conti pursued to invest in and steal cryptocurrencies.

Read more

Please don’t buy this: smart doorbells

Credit to Author: David Ruiz| Date: Mon, 09 Dec 2019 17:15:56 +0000

This holiday season, please reconsider buying smart doorbells to protect your online shipments. The cybersecurity and privacy risks are too severe.

Categories:

Tags:

(Read more…)

The post Please don’t buy this: smart doorbells appeared first on Malwarebytes Labs.

Read more

Parental monitoring apps: How do they differ from stalkerware?

Credit to Author: David Ruiz| Date: Mon, 22 Jul 2019 15:00:00 +0000

What are the differences between stalkerware apps and parental monitoring apps? What is an “acceptable” or “safe” parental monitoring app? And how can a parent know whether they’re downloading a “legitimate” parental monitoring app or instead a stalkerware app merely disguised as a tool for parents?

Categories:

Tags:

(Read more…)

The post Parental monitoring apps: How do they differ from stalkerware? appeared first on Malwarebytes Labs.

Read more