Data and device security for domestic abuse survivors

Credit to Author: David Ruiz| Date: Tue, 13 Aug 2019 16:33:22 +0000

Many domestic abuse survivors need help before stalkerware strikes. Here, we give basic advice on device security and protecting sensitive data.

Categories:

Tags:

(Read more…)

The post Data and device security for domestic abuse survivors appeared first on Malwarebytes Labs.

Read more

Parental monitoring apps: How do they differ from stalkerware?

Credit to Author: David Ruiz| Date: Mon, 22 Jul 2019 15:00:00 +0000

What are the differences between stalkerware apps and parental monitoring apps? What is an “acceptable” or “safe” parental monitoring app? And how can a parent know whether they’re downloading a “legitimate” parental monitoring app or instead a stalkerware app merely disguised as a tool for parents?

Categories:

Tags:

(Read more…)

The post Parental monitoring apps: How do they differ from stalkerware? appeared first on Malwarebytes Labs.

Read more

Fake Instagram assistance apps found on Google Play are stealing passwords

Credit to Author: Nathan Collier| Date: Fri, 12 Apr 2019 17:40:55 +0000

We all want those Instagram likes and followers. But what if the app that’s supposed to be assisting you is also stealing your username and password? As a matter of fact, that’s exactly what we found in three fake Instagram assistance apps found on Google Play.

Categories:

Tags:

(Read more…)

The post Fake Instagram assistance apps found on Google Play are stealing passwords appeared first on Malwarebytes Labs.

Read more

A week in security (March 11 – 17)

Credit to Author: Malwarebytes Labs| Date: Mon, 18 Mar 2019 14:57:10 +0000

A roundup of security news from March 11–17 covering our most recent blogs and other news, including Lazarus Group, Emotet, PSD2, reputation management, Google’s Nest, and Firefox Send.

Categories:

Tags:

(Read more…)

The post A week in security (March 11 – 17) appeared first on Malwarebytes Labs.

Read more

This Week in Security News: Hacker Strategies and Spyware Attacks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 01 Feb 2019 14:00:13 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how hackers are improving their breach strategies. Also, learn about new spyware attacks via URLs, websites, and mobile apps. Read on:  Informing Your Security Posture:…

The post This Week in Security News: Hacker Strategies and Spyware Attacks appeared first on .

Read more

This Week in Security News: Spyware and Data Breaches

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 04 Jan 2019 15:13:45 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about a spyware that disguised itself as an Android application to gather information from users. Also, find out the biggest global data breaches of 2018 and…

The post This Week in Security News: Spyware and Data Breaches appeared first on .

Read more

Yes, Chromebooks can and do get infected

Credit to Author: Thomas Reed| Date: Wed, 19 Dec 2018 15:00:57 +0000

We’ve heard people say Macs don’t get viruses for years, but we know that to be false. But what about Chromebooks? They’re totally safe, right? Think again.

Categories:

Tags:

(Read more…)

The post Yes, Chromebooks can and do get infected appeared first on Malwarebytes Labs.

Read more

Android security audit: An easy-to-follow annual checklist

Credit to Author: JR Raphael| Date: Wed, 12 Dec 2018 13:35:00 -0800

Android security is always a hot topic on these here Nets of Inter — and almost always for the wrong reason.

As we’ve discussed ad nauseam over the years, most of the missives you read about this-or-that super-scary malware/virus/brain-eating-boogie-monster are overly sensationalized accounts tied to theoretical threats with practically zero chance of actually affecting you in the real world. If you look closely, in fact, you’ll start to notice that the vast majority of those stories stem from companies that — gasp! — make their money selling malware protection programs for Android phones. (Pure coincidence, right?)

To read this article in full, please click here

Read more

Sophisticated Android clickfraud apps pose as iPhone apps and devices

Credit to Author: Chen Yu| Date: Thu, 06 Dec 2018 14:00:54 +0000

A collection of Android apps exhibit novel and innovative advertising fraud capabilities<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/aL1P_42frkM” height=”1″ width=”1″ alt=””/>

Read more