MalwareBytes

MalwareBytesSecurity

No man’s land: How a Magecart group is running a web skimming operation from a war zone

Credit to Author: Threat Intelligence Team| Date: Thu, 18 Jul 2019 15:00:13 +0000

We take a look into a Magecart group’s web skimming activities, which are relying on a bulletproof-friendly host in battle-scarred Luhansk, Ukraine to provide cover for their activities, safe from the reach of law enforcement and the security community.

Categories:

Tags:

(Read more…)

The post No man’s land: How a Magecart group is running a web skimming operation from a war zone appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Compromising vital infrastructure: problems in education security continue

Credit to Author: Pieter Arntz| Date: Wed, 17 Jul 2019 14:17:22 +0000

While educational organizations lack funding they are high on the target lists of cybercriminals. Does one fact lead to another?

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: problems in education security continue appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Hi, honey. It’s mom. My phone is acting funny again.

Credit to Author: Kacy Zurkus| Date: Tue, 16 Jul 2019 17:14:42 +0000

Often, older generations must turn to their progenitors for help with technology. What are their frustrations and concerns, and how can younger generations better help?

Categories:

Tags:

(Read more…)

The post Hi, honey. It’s mom. My phone is acting funny again. appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Meet Extenbro, a new DNS-changer Trojan protecting adware

Credit to Author: Pieter Arntz| Date: Mon, 15 Jul 2019 14:54:00 +0000

We found a new Trojan that uses aggressive techniques, including blocking access to security sites, to deliver an adware bundler. Read up on what Extenbro can do and how to get this pest off your system.

Categories:

Tags:

(Read more…)

The post Meet Extenbro, a new DNS-changer Trojan protecting adware appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (July 8 – 14)

Credit to Author: Malwarebytes Labs| Date: Mon, 15 Jul 2019 14:27:09 +0000

A roundup of cybersecurity news from July 8–14, including secure data sending, federal data privacy law, the Soft Cell attack, and more.

Categories:

Tags:

(Read more…)

The post A week in security (July 8 – 14) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Cellular networks under fire from Soft Cell attacks

Credit to Author: Christopher Boyd| Date: Fri, 12 Jul 2019 15:30:00 +0000

We break down the recently revealed attacks on telco operators around the globe, targeting specific high-value individuals.

Categories:

Tags:

(Read more…)

The post Cellular networks under fire from Soft Cell attacks appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Caution: Misuse of security tools can turn against you

Credit to Author: Vasilios Hioureas| Date: Thu, 11 Jul 2019 17:34:57 +0000

If not implemented correctly, the very security tools we use to keep our information private may actually cause data leaks themselves. We outline a few cases and provide suggestions for researchers and security admins.

Categories:

Tags:

(Read more…)

The post Caution: Misuse of security tools can turn against you appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

What should a US federal data privacy law ideally include?

Credit to Author: David Ruiz| Date: Wed, 10 Jul 2019 15:00:00 +0000

What do small, privacy-protective companies think about a federal data privacy law for the US? It turns out, they’re all for it. Here are some of their ideas for US data privacy legislation.

Categories:

Tags:

(Read more…)

The post What should a US federal data privacy law ideally include? appeared first on Malwarebytes Labs.

Read More