Deepfakes FakeApp tool (briefly) includes cryptominer

Credit to Author: Christopher Boyd| Date: Fri, 23 Feb 2018 17:20:00 +0000

We take a look at what happens when one of the most popular DIY Deepfakes programs decides to monetise with a spot of coin mining. Surprise: it doesn’t end well.

Categories:

Tags:

(Read more…)

The post Deepfakes FakeApp tool (briefly) includes cryptominer appeared first on Malwarebytes Labs.

Read more

Bank robbers 2.0: digital thievery and stolen cryptocoins

Credit to Author: Pieter Arntz| Date: Fri, 09 Feb 2018 19:57:07 +0000

A new generation of thieves, bank robbers 2.0, seek to steal huge amounts of money as anonymously as they can. So they’ve developed a multitude of ways to pilfer cryptocurrency.

Categories:

Tags:

(Read more…)

The post Bank robbers 2.0: digital thievery and stolen cryptocoins appeared first on Malwarebytes Labs.

Read more

Free tools: Internet traffic monitoring

Credit to Author: Pieter Arntz| Date: Thu, 14 Dec 2017 19:40:09 +0000

There are many reasons why you might want to start Internet traffic monitoring, especially if you’re a security enthusiast or amateur analyst. We list some free tools that have different use cases.

Categories:

Tags:

(Read more…)

The post Free tools: Internet traffic monitoring appeared first on Malwarebytes Labs.

Read more

How cryptocurrency mining works: Bitcoin vs. Monero

Credit to Author: Pieter Arntz| Date: Mon, 11 Dec 2017 16:00:08 +0000

Why threat actors prefer mining for Monero rather than for the very hot Bitcoin cryptocurrency? Let us point out some possible reasons.

Categories:

Tags:

(Read more…)

The post How cryptocurrency mining works: Bitcoin vs. Monero appeared first on Malwarebytes Labs.

Read more

How to harden AdwCleaner’s web backend using PHP

Credit to Author: Jérôme Boursier| Date: Wed, 06 Dec 2017 16:00:28 +0000

More and more applications are moving from desktop to the web, where they are particularly exposed to security risks. They are often tied to a database backend, and thus need to be properly secured, even though most of the time they are designed to restrict access to authenticated users only. PHP is used to develop…

Categories:

Tags:

(Read more…)

The post How to harden AdwCleaner’s web backend using PHP appeared first on Malwarebytes Labs.

Read more

Blockchain technology: not just for cryptocurrency

Credit to Author: Pieter Arntz| Date: Tue, 05 Dec 2017 18:20:53 +0000

We’ve talked about how cryptocurrency uses blockchain technology. Now we take a closer look at its other applications, and why blockchain is on the brink of changing the world.

Categories:

Tags:

(Read more…)

The post Blockchain technology: not just for cryptocurrency appeared first on Malwarebytes Labs.

Read more