Mac adware is more sophisticated and dangerous than traditional Mac malware

Adware and PUPs can actually be far more invasive and dangerous on the Mac than “real” malware. We demonstrate with analysis of Crossrider, a sophisticated Mac adware that uses evasion and persistence techniques more complex than nation-state malware.

Categories:

Tags:

(Read more…)

The post Mac adware is more sophisticated and dangerous than traditional Mac malware appeared first on Malwarebytes Labs.

Stalkerware and online stalking are accepted by Americans. Why?

Americans may be accepting and minimizing online stalking behaviors, including the use of invasive apps that can pry into a user’s text messages, emails, photos, videos, and phone logs.

Categories:

Tags:

(Read more…)

The post Stalkerware and online stalking are accepted by Americans. Why? appeared first on Malwarebytes Labs.

Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server

Criminals set up fraudulent infrastructure that looks like a typical content delivery network—except it isn’t. Behind it hides a credit card skimmer injected into Magento online stores.

Categories:

Tags:

(Read more…)

The post Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server appeared first on Malwarebytes Labs.

Biotech health care innovations meet security challenges

Advancements in biotech could save thousands, if not millions of lives. But what security and privacy challenges do they introduce? We take a close look at recent innovations.

Categories:

Tags:

(Read more…)

The post Biotech health care innovations meet security challenges appeared first on Malwarebytes Labs.

Introducing Lock and Code: a Malwarebytes Labs podcast

Malwarebytes is launching a podcast, called Lock and Code, on Monday, March 2, breaking down cybersecurity headlines and diving into complex issues with guest interviews. Tune in every two weeks.

Categories:

Tags:

(Read more…)

The post Introducing Lock and Code: a Malwarebytes Labs podcast appeared first on Malwarebytes Labs.

A week in security (February 17 – 23)

A roundup of the previous week’s most notable security stories and events, including cloud identity management, a noteworthy Twitter scam-tastrophy, RobbinHood ransomware, and more.

Categories:

Tags:

(Read more…)

The post A week in security (February 17 – 23) appeared first on Malwarebytes Labs.

Why managed service providers (MSP) are critical for business continuity

What many don’t realize is that SMBs need the same level of protection from threats that are usually only afforded to enterprises. Managed service providers (MSPs) are the key to getting the protection and service they need while staying on budget.

Categories:

Tags:

(Read more…)

The post Why managed service providers (MSP) are critical for business continuity appeared first on Malwarebytes Labs.

Threat spotlight: RobbinHood ransomware takes the driver’s seat

RobbinHood a is a ransomware family that specifically targets organizations using a vulnerable kernel driver to prepare systems for encryption. Learn how to protect against it.

Categories:

Tags:

(Read more…)

The post Threat spotlight: RobbinHood ransomware takes the driver’s seat appeared first on Malwarebytes Labs.

Rudy Giuliani’s Twitter mishaps invite typosquatters and scammers

Rudy Giuliani’s Twitter account contains many typos that lead to the wrong website—and scammers and typosquatters are taking advantage.

Categories:

Tags:

(Read more…)

The post Rudy Giuliani’s Twitter mishaps invite typosquatters and scammers appeared first on Malwarebytes Labs.

Harnessing the power of identity management (IDaaS) in the cloud

With security, compliance, and customer engagement driving organizations to the cloud, it’s no wonder IDaaS has become the standard in identity management. Learn about the benefits and concerns of IDaaS for organizations of all sizes.

Categories:

Tags:

(Read more…)

The post Harnessing the power of identity management (IDaaS) in the cloud appeared first on Malwarebytes Labs.