Spear phishing 101: what you need to know

We look at the threat of spear phishing, why it’s such a problem, and what organizations can do to lessen the chance of a successful attack.

Categories:

Tags:

(Read more…)

The post Spear phishing 101: what you need to know appeared first on Malwarebytes Labs.

Sextortion scammers getting creative

We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of…

Categories:

Tags:

(Read more…)

The post Sextortion scammers getting creative appeared first on Malwarebytes Labs.

Emotet malspam campaign uses Snowden’s new book as lure

Emotet starts a new week of malicious spam by promising a copy of Edward Snowden’s new book.

Categories:

Tags:

(Read more…)

The post Emotet malspam campaign uses Snowden’s new book as lure appeared first on Malwarebytes Labs.

Emotet is back: botnet springs back to life with new spam campaign

After months of laying dormant, the notorious Emotet is back, with its botnet spewing spam globally.

Categories:

Tags:

(Read more…)

The post Emotet is back: botnet springs back to life with new spam campaign appeared first on Malwarebytes Labs.

Businesses: It’s time to implement an anti-phishing plan

If your organization doesn’t have an anti-phishing plan in place, it’s time to start thinking about one. Here’s what to tell your employees and customers about phishing attacks.

Categories:

Tags:

(Read more…)

The post Businesses: It’s time to implement an anti-phishing plan appeared first on Malwarebytes Labs.

Sextortion Bitcoin scam makes unwelcome return

A well-worn sextortion scam is back in user’s inboxes. We explain what to look for and why recipients shouldn’t panic.

Categories:

Tags:

(Read more…)

The post Sextortion Bitcoin scam makes unwelcome return appeared first on Malwarebytes Labs.

Compromising vital infrastructure: air traffic control

The aviation industry and air traffic (control) are vital elements of our infrastructure. While flying is reportedly safe, how does that landscape look cybersecurity-wise?

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: air traffic control appeared first on Malwarebytes Labs.

Compromising vital infrastructure: air traffic control

The aviation industry and air traffic (control) are vital elements of our infrastructure. While flying is reportedly safe, how does that landscape look cybersecurity-wise?

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: air traffic control appeared first on Malwarebytes Labs.

Phone spampocalypse: fighting back in the age of unwanted calls

US telecommunications companies have the technology to protect customers against the rising tide of unwanted calls—they just haven’t done it yet. So it’s up to lawmakers and consumers themselves to fight back against phone spampocalypse. Here’s how they’re doing it.

Categories:

Tags:

(Read more…)

The post Phone spampocalypse: fighting back in the age of unwanted calls appeared first on Malwarebytes Labs.