IoT bills and guidelines: a global response

Credit to Author: Christopher Boyd| Date: Fri, 22 Nov 2019 16:27:47 +0000

IoT laws and guidelines abound, as we take a look what’s happening around the world in the name of securing Internet-connected devices.

Categories:

Tags:

(Read more…)

The post IoT bills and guidelines: a global response appeared first on Malwarebytes Labs.

Read more

Web skimmer phishes credit card data via rogue payment service platform

Credit to Author: Jérôme Segura| Date: Thu, 21 Nov 2019 17:30:00 +0000

Threat actors combine phishing with a web skimmer to create a devious scheme designed to lift credit card data from unaware shoppers.

Categories:

Tags:

(Read more…)

The post Web skimmer phishes credit card data via rogue payment service platform appeared first on Malwarebytes Labs.

Read more

Explained: juice jacking

Credit to Author: Pieter Arntz| Date: Thu, 21 Nov 2019 16:00:00 +0000

Juice jacking is a type of cyberattack that uses a USB charging port to steal data or infect phones with malware. Learn how it works and ways to protect against it.

Categories:

Tags:

(Read more…)

The post Explained: juice jacking appeared first on Malwarebytes Labs.

Read more

Deepfakes and LinkedIn: malign interference campaigns

Credit to Author: Christopher Boyd| Date: Wed, 20 Nov 2019 16:00:00 +0000

Don’t discount deepfakes just yet. We may not be fooled by phony Mark Zuckerberg anymore, but the discovery of a fake LinkedIn profile sporting a deepfake avatar shows how social engineering can deceive through the mundane.

Categories:

Tags:

(Read more…)

The post Deepfakes and LinkedIn: malign interference campaigns appeared first on Malwarebytes Labs.

Read more

Exploit kits: fall 2019 review

Credit to Author: Jérôme Segura| Date: Tue, 19 Nov 2019 18:08:20 +0000

With even more exploit kits in town, the drive-by download landscape shows continued activity in fall 2019.

Categories:

Tags:

(Read more…)

The post Exploit kits: fall 2019 review appeared first on Malwarebytes Labs.

Read more

Malwarebytes teams up with security vendors and advocacy groups to launch Coalition Against Stalkerware

Credit to Author: David Ruiz| Date: Tue, 19 Nov 2019 13:00:00 +0000

Today, Malwarebytes is announcing its participation in a joint effort to stop invasive digital surveillance: the Coalition Against Stalkerware.

Categories:

Tags:

(Read more…)

The post Malwarebytes teams up with security vendors and advocacy groups to launch Coalition Against Stalkerware appeared first on Malwarebytes Labs.

Read more

A week in security (November 11 – 17)

Credit to Author: Malwarebytes Labs| Date: Mon, 18 Nov 2019 16:43:14 +0000

A roundup of cybersecurity news from November 11 – 17, including Facebook scams, the importance of securing food infrastructure, and our latest CTNT report.

Categories:

Tags:

(Read more…)

The post A week in security (November 11 – 17) appeared first on Malwarebytes Labs.

Read more

Stalkerware’s legal enforcement problem

Credit to Author: David Ruiz| Date: Mon, 18 Nov 2019 15:47:58 +0000

Those who install stalkerware with the intent to monitor, control, harass, or otherwise abuse their victims typically get away with it, avoiding legal penalty even if there’s plenty of evidence to suggest their guilt.

Categories:

Tags:

(Read more…)

The post Stalkerware’s legal enforcement problem appeared first on Malwarebytes Labs.

Read more

Stealthy new Android malware poses as ad blocker, serves up ads instead

Credit to Author: Nathan Collier| Date: Thu, 14 Nov 2019 19:51:58 +0000

Since its discovery less than a month ago, a stealthy new Android malware has already been detected on over 500 devices, and it’s on the rise. Learn how this clever threat pretends to be an ad blocker and then hides itself on mobile devices, all while serving up tons of ads.

Categories:

Tags:

(Read more…)

The post Stealthy new Android malware poses as ad blocker, serves up ads instead appeared first on Malwarebytes Labs.

Read more