A week in security (April 27 – May 3)

A roundup of the previous week’s security news, including cloud data protection, Troldesh, VPNs, the cybercrime economy, and more.

Categories:

Tags:

(Read more…)

The post A week in security (April 27 – May 3) appeared first on Malwarebytes Labs.

iOS Mail bug allows remote zero-click attacks

A newly-discovered vulnerability in iOS Mail can be used to attack an iPhone remotely using a malicious e-mail message, even if you’re running the latest version of iOS (13.4.1).

Categories:

Tags:

(Read more…)

The post iOS Mail bug allows remote zero-click attacks appeared first on Malwarebytes Labs.

The passwordless present: Will biometrics replace passwords forever?

The effectiveness of passwords to protect data has long been debated. Many have called for the death of passwords, instead pushing for biometrics to secure their most precious information. But is biometrics really a better, safer option?

Categories:

Tags:

(Read more…)

The post The passwordless present: Will biometrics replace passwords forever? appeared first on Malwarebytes Labs.

A week in security (January 20 – 26)

A roundup of the previous week’s most notable security stories and events, including tech support scams, deepfakes, and the latest ransomware attack in Florida.

Categories:

Tags:

(Read more…)

The post A week in security (January 20 – 26) appeared first on Malwarebytes Labs.

New iOS exploit checkm8 allows permanent compromise of iPhones

A new exploit for iOS enables attackers to gain permanent access to iPhones, iPads, Apple Watches, and more—with zero potential for patching. Learn why this is possibly the biggest security news for iOS since its inception.

Categories:

Tags:

(Read more…)

The post New iOS exploit checkm8 allows permanent compromise of iPhones appeared first on Malwarebytes Labs.

Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks

Researchers called it KNOB, a clever attack against the firmware of a Bluetooth chip that can allow hackers to successfully hijack paired devices and steal their sensitive data. Are users at risk?

Categories:

Tags:

(Read more…)

The post Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks appeared first on Malwarebytes Labs.

Backdoors are a security vulnerability

Upset by their inability to access potentially vital evidence for criminal investigations, the federal government has, for years, pushed to convince tech companies to build backdoors that will, allegedly, only be used by law enforcement agencies. The problem, cybersecurity researchers say, is that those backdoors can easily be exploited by criminals.

Categories:

Tags:

(Read more…)

The post Backdoors are a security vulnerability appeared first on Malwarebytes Labs.

Consumers have few legal options for protecting privacy

Amidst never-ending headlines about data breaches, data misuse, and opaque data-sharing agreements from major companies, users have few legal options to actually protect their privacy in court. Instead, they rely on technology.

Categories:

Tags:

(Read more…)

The post Consumers have few legal options for protecting privacy appeared first on Malwarebytes Labs.