Business in the front, party in the back: backdoors in elastic servers expose private data

Credit to Author: Vasilios Hioureas| Date: Fri, 17 Jan 2020 18:58:47 +0000

It’s all too easy to discover data leaks online, especially in cloud services. We take a look at misconfigurations in elastic servers that lead to exposed data on the Internet.

Categories:

Tags:

(Read more…)

The post Business in the front, party in the back: backdoors in elastic servers expose private data appeared first on Malwarebytes Labs.

Read more

Explained: data enrichment

Credit to Author: Pieter Arntz| Date: Thu, 16 Jan 2020 18:27:53 +0000

Data enrichment applies to the process of enhancing, refining, and improving raw data. Used by companies to improve marketing efforts, data enrichment impacts both privacy and security.

Categories:

Tags:

(Read more…)

The post Explained: data enrichment appeared first on Malwarebytes Labs.

Read more

Rules on deepfakes take hold in the US

Credit to Author: David Ruiz| Date: Wed, 15 Jan 2020 16:59:33 +0000

Rather than creating new policies or crimes for deepfakes—like making it illegal to use them to deceive—the NDAA seeks a better understanding to the burgeoning technology.

Categories:

Tags:

(Read more…)

The post Rules on deepfakes take hold in the US appeared first on Malwarebytes Labs.

Read more

How to prevent a rootkit attack

Credit to Author: Gilad Maayan| Date: Tue, 14 Jan 2020 17:31:55 +0000

Rootkit attacks are considered one of the most dangerous cyberthreats today. Learn what they are, how they infect systems, and how to protect against them.

Categories:

Tags:

(Read more…)

The post How to prevent a rootkit attack appeared first on Malwarebytes Labs.

Read more

A week in security (January 6 – 12)

Credit to Author: Malwarebytes Labs| Date: Mon, 13 Jan 2020 16:29:59 +0000

A cybersecurity news roundup from January 6–12, with a look at Phobos ransomware and a discovery of pre-installed malware on government-funded phones.

Categories:

Tags:

(Read more…)

The post A week in security (January 6 – 12) appeared first on Malwarebytes Labs.

Read more

Threat spotlight: Phobos ransomware lives up to its name

Credit to Author: Jovi Umawing| Date: Fri, 10 Jan 2020 18:04:44 +0000

Phobos, which many believe was named after the Greek god of fear, isn’t as widespread as it was before nor is it more novel than your average ransomware. Yet, it remains a threat to consumers and businesses alike. We dive into Phobos ransomware and show users how to face their fears and protect against it.

Categories:

Tags:

(Read more…)

The post Threat spotlight: Phobos ransomware lives up to its name appeared first on Malwarebytes Labs.

Read more

United States government-funded phones come pre-installed with unremovable malware

Credit to Author: Nathan Collier| Date: Thu, 09 Jan 2020 16:00:00 +0000

A US-funded government assistance program is selling budget-friendly mobile phones that come pre-installed with unremovable malicious apps. Malwarebytes Labs investigates the malware’s origins.

Categories:

Tags:

(Read more…)

The post United States government-funded phones come pre-installed with unremovable malware appeared first on Malwarebytes Labs.

Read more

6 ways hackers are targeting retail businesses

Credit to Author: Kayla Matthews| Date: Wed, 08 Jan 2020 18:04:10 +0000

Whether it’s a high-volume shopping season or not, retail businesses are at risk from cybercriminals in a number of ways. Learn how hackers target retailers and shoppers alike.

Categories:

Tags:

(Read more…)

The post 6 ways hackers are targeting retail businesses appeared first on Malwarebytes Labs.

Read more

Dubious downloads: How to check if a website and its files are malicious

Credit to Author: Pieter Arntz| Date: Tue, 07 Jan 2020 17:45:08 +0000

Users often search the web for downloads when companies no longer support software, and what they find is dubious. How can they tell if the files are safe? We tell how to spot the difference.

Categories:

Tags:

(Read more…)

The post Dubious downloads: How to check if a website and its files are malicious appeared first on Malwarebytes Labs.

Read more

Billion-dollar search engine industry attracts vultures, shady advertisers, and cybercriminals

Credit to Author: Pieter Arntz| Date: Mon, 06 Jan 2020 20:04:21 +0000

We look at the ways in which criminals and vultures use less-than-honest tactics to fleece the search engine industry for a piece of its billion-dollar pie.

Categories:

Tags:

(Read more…)

The post Billion-dollar search engine industry attracts vultures, shady advertisers, and cybercriminals appeared first on Malwarebytes Labs.

Read more