Rules on deepfakes take hold in the US

Rather than creating new policies or crimes for deepfakes—like making it illegal to use them to deceive—the NDAA seeks a better understanding to the burgeoning technology.

Categories:

Tags:

(Read more…)

The post Rules on deepfakes take hold in the US appeared first on Malwarebytes Labs.

How to prevent a rootkit attack

Rootkit attacks are considered one of the most dangerous cyberthreats today. Learn what they are, how they infect systems, and how to protect against them.

Categories:

Tags:

(Read more…)

The post How to prevent a rootkit attack appeared first on Malwarebytes Labs.

A week in security (January 6 – 12)

A cybersecurity news roundup from January 6–12, with a look at Phobos ransomware and a discovery of pre-installed malware on government-funded phones.

Categories:

Tags:

(Read more…)

The post A week in security (January 6 – 12) appeared first on Malwarebytes Labs.

Threat spotlight: Phobos ransomware lives up to its name

Phobos, which many believe was named after the Greek god of fear, isn’t as widespread as it was before nor is it more novel than your average ransomware. Yet, it remains a threat to consumers and businesses alike. We dive into Phobos ransomware and show users how to face their fears and protect against it.

Categories:

Tags:

(Read more…)

The post Threat spotlight: Phobos ransomware lives up to its name appeared first on Malwarebytes Labs.

United States government-funded phones come pre-installed with unremovable malware

A US-funded government assistance program is selling budget-friendly mobile phones that come pre-installed with unremovable malicious apps. Malwarebytes Labs investigates the malware’s origins.

Categories:

Tags:

(Read more…)

The post United States government-funded phones come pre-installed with unremovable malware appeared first on Malwarebytes Labs.

6 ways hackers are targeting retail businesses

Whether it’s a high-volume shopping season or not, retail businesses are at risk from cybercriminals in a number of ways. Learn how hackers target retailers and shoppers alike.

Categories:

Tags:

(Read more…)

The post 6 ways hackers are targeting retail businesses appeared first on Malwarebytes Labs.

Dubious downloads: How to check if a website and its files are malicious

Users often search the web for downloads when companies no longer support software, and what they find is dubious. How can they tell if the files are safe? We tell how to spot the difference.

Categories:

Tags:

(Read more…)

The post Dubious downloads: How to check if a website and its files are malicious appeared first on Malwarebytes Labs.

Billion-dollar search engine industry attracts vultures, shady advertisers, and cybercriminals

We look at the ways in which criminals and vultures use less-than-honest tactics to fleece the search engine industry for a piece of its billion-dollar pie.

Categories:

Tags:

(Read more…)

The post Billion-dollar search engine industry attracts vultures, shady advertisers, and cybercriminals appeared first on Malwarebytes Labs.

A week in security (December 30 – January 5)

A roundup of the previous week’s most notable security stories and events, including new web skimmer techniques, an explanation of edge computing, and more.

Categories:

Tags:

(Read more…)

The post A week in security (December 30 – January 5) appeared first on Malwarebytes Labs.

Mac threat detections on the rise in 2019

For the first time ever, Mac threats broke into Malwarebytes’ top five overall detections of 2019. Take a look at this and other telemetry that shows Mac malware is certainly on the rise.

Categories:

Tags:

(Read more…)

The post Mac threat detections on the rise in 2019 appeared first on Malwarebytes Labs.