Flurry of new Mac malware drops in December

Credit to Author: Thomas Reed| Date: Tue, 11 Dec 2018 16:00:00 +0000

Multiple new pieces of Mac malware have appeared in December, all distributed through different means, but all opening backdoors on infected computers.

Categories:

Tags:

(Read more…)

The post Flurry of new Mac malware drops in December appeared first on Malwarebytes Labs.

Read more

Machine learning vs. social engineering

Credit to Author: Windows Defender ATP| Date: Thu, 07 Jun 2018 13:00:56 +0000

Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new and unknown threats. Just in the last few months, machine learning has helped us to protect hundreds of thousands of customers against ransomware,

Read more

Read more

Blocks for Flash and others coming to Office 365

Credit to Author: Christopher Boyd| Date: Fri, 01 Jun 2018 15:00:00 +0000

If you make use of Flash or Silverlight in your day-to-day activities, you may need to have a word with IT. For everyone else, your Office 365 experience is about to become a lot more secure.

Categories:

Tags:

(Read more…)

The post Blocks for Flash and others coming to Office 365 appeared first on Malwarebytes Labs.

Read more

Malware analysis: decoding Emotet, part 1

Credit to Author: Vishal Thakur| Date: Fri, 25 May 2018 15:00:00 +0000

In the first part of this two-part analysis of Emotet, we look at the VBA code, where you’ll learn how to recognize and discard “dead” code thrown in to complicate the analysis process.

Categories:

Tags:

(Read more…)

The post Malware analysis: decoding Emotet, part 1 appeared first on Malwarebytes Labs.

Read more

Locky malware, lucky to avoid it

You may have seen reports of the Locky malware circulating the web; we think this is a good time to discuss its distribution methods, and reiterate some best-practice methods that will help prevent infection. We’ve seen Locky being distributed by spam email, not in itself a unique distribution method, but this means that spreading is…

Read more