MalwareBytes

MalwareBytesSecurity

Enterprise incident response: getting ahead of the wave

Credit to Author: William Tsing| Date: Wed, 10 Jul 2019 14:19:31 +0000

As with traditional warfare, beating back attacks and winning depends on having a plan. Here are several incident respond models security researchers have developed for responding to threats.

Categories:

Tags:

(Read more…)

The post Enterprise incident response: getting ahead of the wave appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

How to securely send your personal information

Credit to Author: Seth Rosenblatt| Date: Mon, 08 Jul 2019 16:00:00 +0000

On its own, email is not safe for sending credit card or passport numbers. Here’s how to securely send personal information over the Internet.

Categories:

Tags:

(Read more…)

The post How to securely send your personal information appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (July 1 – 7)

Credit to Author: Pieter Arntz| Date: Mon, 08 Jul 2019 15:08:33 +0000

A roundup of cybersecurity news from July 1-7, including stalkerware, Bitcoin generators, app permissions, Chinese spyware, some giant leaks, and a new malware attack method.

Categories:

Tags:

(Read more…)

The post A week in security (July 1 – 7) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Cooperating apps and automatic permissions are setting you up for failure

Credit to Author: Pieter Arntz| Date: Tue, 02 Jul 2019 16:53:10 +0000

Apps that cooperate and share permissions might seem convenient, but are they worth the security and privacy risk?

Categories:

Tags:

(Read more…)

The post Cooperating apps and automatic permissions are setting you up for failure appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (June 24 – 30)

Credit to Author: Malwarebytes Labs| Date: Mon, 01 Jul 2019 17:02:56 +0000

A roundup of cybersecurity news from June 24–30, including top malicious web campaigns, updates on the GreenFlash Sundown exploit, a Malwarebytes initiative to double down on stalkerware detection and awareness, and more.

Categories:

Tags:

(Read more…)

The post A week in security (June 24 – 30) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Helping survivors of domestic abuse: What to do when you find stalkerware

Credit to Author: David Ruiz| Date: Mon, 01 Jul 2019 16:51:59 +0000

Starting today, we’re doing more to protect stalkerware victims than improve our detection capabilities. We’re helping survivors understand how to tell if they’re being watched on their devices—and how to safely get out of the situation.

Categories:

Tags:

(Read more…)

The post Helping survivors of domestic abuse: What to do when you find stalkerware appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Fake jquery campaign leads to malvertising and ad fraud schemes

Credit to Author: Jérôme Segura| Date: Thu, 27 Jun 2019 16:14:35 +0000

We look for answers in a long-running and yet mysterious malware campaign that has compromised thousands of websites to date.

Categories:

Tags:

(Read more…)

The post Fake jquery campaign leads to malvertising and ad fraud schemes appeared first on Malwarebytes Labs.

Read More