What is the price of your stolen identity on the online black market?

Credit to Author: Rajiv Singha| Date: Tue, 10 Jul 2018 10:00:04 +0000

If you thought there is only a black market for stolen mobile phones, drugs, pirated software, etc., then you could be wrong. There is a black market that exists on the Internet and its most lucrative commodity is your personally identifiable information (PII – sensitive information that can be used…

Read more

Machine learning vs. social engineering

Credit to Author: Windows Defender ATP| Date: Thu, 07 Jun 2018 13:00:56 +0000

Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new and unknown threats. Just in the last few months, machine learning has helped us to protect hundreds of thousands of customers against ransomware,

Read more

Read more

3 common types of phishing attacks and tips to avoid them

Credit to Author: Rajiv Singha| Date: Tue, 26 Jun 2018 10:51:01 +0000

Phishing is one of the oldest tricks in the book of hackers. But as old as it might be, phishing still remains the most lucrative tool for cybercriminals; as they say, old is gold. This post tells you about the 3 common types of phishing attacks and tips to avoid…

Read more

PSA: Recruitment portals and job sites at risk

Credit to Author: Malwarebytes Labs| Date: Wed, 20 Jun 2018 16:00:00 +0000

We’ve warned job seekers to be wary of phishing attacks, and we’re now doing the same for recruitment professionals: Beware of your recruitment portals, as they may play host to a lot of bad apples who—trust us—you wouldn’t want to hire out anywhere.

Categories:

Tags:

(Read more…)

The post PSA: Recruitment portals and job sites at risk appeared first on Malwarebytes Labs.

Read more

Machine learning vs. social engineering

Credit to Author: Windows Defender ATP| Date: Thu, 07 Jun 2018 13:00:56 +0000

Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new and unknown threats. Just in the last few months, machine learning has helped us to protect hundreds of thousands of customers against ransomware,

Read more

Read more

PSA: Users with landlines are more vulnerable to scams

Credit to Author: Jean Taggart| Date: Wed, 06 Jun 2018 15:00:00 +0000

Anyone still using a home phone be warned: having landlines makes you particularly vulnerable to scams. Read on to learn how to keep your landline but stay safe from cyberattacks.

Categories:

Tags:

(Read more…)

The post PSA: Users with landlines are more vulnerable to scams appeared first on Malwarebytes Labs.

Read more

A conversation with America Geeks

Credit to Author: William Tsing| Date: Thu, 31 May 2018 16:00:00 +0000

We first published on tech scammers America Geeks back in 2015 and again in 2016. This time, they opened a help ticket with us, requesting we take down our blog post—which warranted a phone call. Read on to learn how our conversation with America Geeks went.

Categories:

Tags:

(Read more…)

The post A conversation with America Geeks appeared first on Malwarebytes Labs.

Read more

Instagram story spam claims free Apple Watch

Credit to Author: Christopher Boyd| Date: Thu, 31 May 2018 15:00:00 +0000

We take a look at Instagram story spam leading to a “free Apple Watch” giveaway on a recently compromised celebrity account.

Categories:

Tags:

(Read more…)

The post Instagram story spam claims free Apple Watch appeared first on Malwarebytes Labs.

Read more

Happy anniversary to Dreamcast…and its scams

Credit to Author: Christopher Boyd| Date: Thu, 24 May 2018 15:00:00 +0000

On the 20th anniversary of Dreamcast, we take a trip down memory lane; specifically, years of scams tied to the beloved console.

Categories:

Tags:

(Read more…)

The post Happy anniversary to Dreamcast…and its scams appeared first on Malwarebytes Labs.

Read more