Alert! 27 apps found on Google Play Store that prompt you to install Fake Google Play Store

Credit to Author: Vaibhav Billade| Date: Mon, 19 Aug 2019 10:29:14 +0000

Quick Heal Security Lab spotted 27 malicious apps of dropper category on official “Google Play Store”. These apps have been removed from Play Store after Quick Heal Security Lab reported it to Google last week. These apps continuously show installation prompt for fake “Google Play Store”. If any user falls…

Read more

Alert! 27 apps found on Google Play Store that prompt you to install Fake Google Play Store

Credit to Author: Vaibhav Billade| Date: Mon, 19 Aug 2019 10:29:14 +0000

Quick Heal Security Lab spotted 27 malicious apps of dropper category on official “Google Play Store”. These apps have been removed from Play Store after Quick Heal Security Lab reported it to Google last week. These apps continuously show installation prompt for fake “Google Play Store”. If any user falls…

Read more

Trinity Miner using open ADB port to target IoT devices

Credit to Author: Vallabh Chole| Date: Fri, 26 Jul 2019 10:08:11 +0000

In the 21st century, life is becoming smart and evolving at a fast pace. Even day to day gadgets are becoming smarter. All these IoT devices are powered by ARM-based processor and run on android and unix operating system. These IoT devices include mobiles, smart T.V., routers, IP cameras and…

Read more

Compromising vital infrastructure: problems in education security continue

Credit to Author: Pieter Arntz| Date: Wed, 17 Jul 2019 14:17:22 +0000

While educational organizations lack funding they are high on the target lists of cybercriminals. Does one fact lead to another?

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: problems in education security continue appeared first on Malwarebytes Labs.

Read more

A week in security (July 8 – 14)

Credit to Author: Malwarebytes Labs| Date: Mon, 15 Jul 2019 14:27:09 +0000

A roundup of cybersecurity news from July 8–14, including secure data sending, federal data privacy law, the Soft Cell attack, and more.

Categories:

Tags:

(Read more…)

The post A week in security (July 8 – 14) appeared first on Malwarebytes Labs.

Read more

Cellular networks under fire from Soft Cell attacks

Credit to Author: Christopher Boyd| Date: Fri, 12 Jul 2019 15:30:00 +0000

We break down the recently revealed attacks on telco operators around the globe, targeting specific high-value individuals.

Categories:

Tags:

(Read more…)

The post Cellular networks under fire from Soft Cell attacks appeared first on Malwarebytes Labs.

Read more

Ransomware As A Tool – LockerGoga

Credit to Author: Ghanshyam More| Date: Wed, 03 Jul 2019 07:18:00 +0000

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware as a Tool has evolved in wild…

Read more

Beware! Email attachments can make you victim of spear phishing attacks

Credit to Author: Prashant Tilekar| Date: Fri, 21 Jun 2019 09:15:28 +0000

In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. In this type of attack, the attacker uses social engineering tricks and some…

Read more

A week in security (June 17 – 23)

Credit to Author: Malwarebytes Labs| Date: Mon, 24 Jun 2019 16:29:46 +0000

A roundup of security news from June 17–23, including Android attacks, IoT mishaps, cities under fire from ransomware, and much more.

Categories:

Tags:

(Read more…)

The post A week in security (June 17 – 23) appeared first on Malwarebytes Labs.

Read more

New Mac cryptominer Malwarebytes detects as Bird Miner runs by emulating Linux

Credit to Author: Thomas Reed| Date: Thu, 20 Jun 2019 15:33:38 +0000

A new Mac cryptominer we call Bird Miner was found on pirated music production software that interestingly runs via Linux. Learn how this unique malware attempts, and ultimately fails, at using stealth techniques.

Categories:

Tags:

(Read more…)

The post New Mac cryptominer Malwarebytes detects as Bird Miner runs by emulating Linux appeared first on Malwarebytes Labs.

Read more