Magecart criminals caught stealing with their poker face on

Credit to Author: Jérôme Segura| Date: Tue, 20 Aug 2019 15:00:38 +0000

This blog post details the curious case of a web skimmer encountered in a poker application.

Categories:

Tags:

(Read more…)

The post Magecart criminals caught stealing with their poker face on appeared first on Malwarebytes Labs.

Read more

A week in security (August 12 – 18)

Credit to Author: Malwarebytes Labs| Date: Mon, 19 Aug 2019 17:55:50 +0000

A roundup of the most interesting cybersecurity news stories from August 12 to 18, including a deep dive into facial recognition technology, swatting dangers, social engineering attacks on cities, and more.

Categories:

Tags:

(Read more…)

The post A week in security (August 12 – 18) appeared first on Malwarebytes Labs.

Read more

How much personalization is too much?

Credit to Author: Seth Rosenblatt| Date: Mon, 19 Aug 2019 15:00:00 +0000

Personalization is the new mantra of marketers—and most people are perfectly okay with that. But when does personalization cross the line into invasive? And what can uncomfortable consumers do about blocking it?

Categories:

Tags:

(Read more…)

The post How much personalization is too much? appeared first on Malwarebytes Labs.

Read more

QxSearch hijacker fakes failed installs

Credit to Author: Pieter Arntz| Date: Fri, 16 Aug 2019 21:06:16 +0000

QxSearch is a group of search hijackers that try to make the user think the install failed or was incomplete. Is it that they don’t want to be found and removed? Or just bad programming?

Categories:

Tags:

(Read more…)

The post QxSearch hijacker fakes failed installs appeared first on Malwarebytes Labs.

Read more

The Hidden Bee infection chain, part 1: the stegano pack

Credit to Author: hasherezade| Date: Thu, 15 Aug 2019 15:26:55 +0000

The Hidden Bee cryptominer has a complex and multi-layered internal structure that is unusual among cybercrime toolkits. That’s why we’re dedicating a series of posts to exploring its elements and updates made during one year of its evolution.

Categories:

Tags:

(Read more…)

The post The Hidden Bee infection chain, part 1: the stegano pack appeared first on Malwarebytes Labs.

Read more

Trojans, ransomware dominate 2018–2019 education threat landscape

Credit to Author: Wendy Zamora| Date: Wed, 14 Aug 2019 13:00:00 +0000

Trojans such as Emotet and TrickBot were the top threat for the education sector in the 2018–2019 school year. What threats will the new school year bring?

Categories:

Tags:

(Read more…)

The post Trojans, ransomware dominate 2018–2019 education threat landscape appeared first on Malwarebytes Labs.

Read more

Data and device security for domestic abuse survivors

Credit to Author: David Ruiz| Date: Tue, 13 Aug 2019 16:33:22 +0000

Many domestic abuse survivors need help before stalkerware strikes. Here, we give basic advice on device security and protecting sensitive data.

Categories:

Tags:

(Read more…)

The post Data and device security for domestic abuse survivors appeared first on Malwarebytes Labs.

Read more

Facial recognition technology: force for good or privacy threat?

Credit to Author: Christopher Boyd| Date: Mon, 12 Aug 2019 15:00:00 +0000

It seems facial recognition technology, as technology so often does, has raced far ahead of our ability to define its ethical use. We take a hard look at major concerns brewing in cities around the world.

Categories:

Tags:

(Read more…)

The post Facial recognition technology: force for good or privacy threat? appeared first on Malwarebytes Labs.

Read more

A week in security (August 5 – 11)

Credit to Author: Malwarebytes Labs| Date: Mon, 12 Aug 2019 15:38:31 +0000

The latest cybersecurity news for the week of August 5–11. We touch on problematic backdoors, the grim possibility of the Internet of Thoughts, and smart home improvement. We also released a retrospective report on ransomware.

Categories:

Tags:

(Read more…)

The post A week in security (August 5 – 11) appeared first on Malwarebytes Labs.

Read more

Backdoors are a security vulnerability

Credit to Author: David Ruiz| Date: Fri, 09 Aug 2019 16:10:27 +0000

Upset by their inability to access potentially vital evidence for criminal investigations, the federal government has, for years, pushed to convince tech companies to build backdoors that will, allegedly, only be used by law enforcement agencies. The problem, cybersecurity researchers say, is that those backdoors can easily be exploited by criminals.

Categories:

Tags:

(Read more…)

The post Backdoors are a security vulnerability appeared first on Malwarebytes Labs.

Read more