Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2018-12-19 15:00:05 |
Yes, Chromebooks can and do get infected (lien direct) |
We've heard people say Macs don't get viruses for years, but we know that to be false. But what about Chromebooks? They're totally safe, right? Think again.
Categories:
101
FYI
Tags: AndroidChromebook antimalwareChromebooks antivirusChromebooks malwareChromes OSGoogleGoogle Playmac malware
(Read more...)
|
|
|
|
|
2018-12-18 16:00:00 |
All the reasons why cybercriminals want to hack your phone (lien direct) |
Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn't they? We take a look at all the reasons hackers have for breaking into your most precious device-and what you can do to stop it.
Categories:
101
FYI
Tags: Androidappscryptomininghack your phonehackingiOSloapimining cryptocurrencyMobilemobile phonesmobile ransomwaremobile securityransomwareransomware attack
(Read more...)
|
Hack
|
|
|
|
2018-12-17 20:10:02 |
Mobile Menace Monday: Is Fuchsia OS the end of Android? (lien direct) |
The next major Android version will be Android Q and not Android 9.1 Pie. In parallel, Google is also developing a new operating system based on its own microkernel called Fuchsia. Will this be the OS that replaces Android? Read on to find out.
Categories:
Cybercrime
Mobile
Tags: AndroidflutterfuchsiaGooglemobile menace mondayoperating systemtriple mZircon
(Read more...)
|
|
|
|
|
2018-12-17 17:58:03 |
A week in security (December 10 – 16) (lien direct) |
A roundup of last week's security news from December 10–16, including facial recognition technology, abandoned USB sticks, even more trouble at Facebook, Google bugs, and more.
Categories:
Security world
Week in security
Tags: AndroidBitcoin bomb threatbugfacebookmac malwarepasswordsSMB vulnerabilitiesUSB stickswindows 10
(Read more...)
|
|
|
|
|
2018-12-14 16:00:00 |
How threat actors are using SMB vulnerabilities (lien direct) |
SMB vulnerabilities have been so successful for criminals that they've been used in some of the most devastating ransomware and Trojan attacks of the last two years. Learn how they work and how your organization can protect against them.
Categories:
101
Business
Tags: EternalBlueEternalChampionEternalRomanceexploitsNSA toolsShadowBrokersSMB vulnerabilitiesvulnerabilities
(Read more...)
|
Ransomware
Threat
|
|
|
|
2018-12-13 16:00:00 |
Compromising vital infrastructure: the power grid (lien direct) |
How are we doing at protecting the vital infrastructure of our power grid and its components against physical and cyberattacks?
Categories:
Business
Cybercrime
Tags: backupblackenergycrashoverridedragonflynrcNuclearpower gridsandwormstuxnet
(Read more...)
|
|
|
|
|
2018-12-11 16:56:05 |
Data scraping treasure trove found in the wild (lien direct) |
3 large databases containing scraped content landed in front of security researchers. How bad is it?
Categories:
Cybercrime
Privacy
Tags: businessdata scrapingemailLinkedInscrapersspam
(Read more...)
|
|
|
|
|
2018-12-11 16:00:00 |
Flurry of new Mac malware drops in December (lien direct) |
Multiple new pieces of Mac malware have appeared in December, all distributed through different means, but all opening backdoors on infected computers.
Categories:
Mac
Threat analysis
Tags: backdoorsmac malwaremacrosmicrosoft wordSocial Engineeringword
(Read more...)
|
Malware
|
|
|
|
2018-12-10 17:32:01 |
A week in security (December 3 – 9) (lien direct) |
A roundup of last week's security news from December 3–9, including a new Mac malware, a new Flash zero-day vulnerability, a new Malwarebytes report focusing on current undetectable malware, and breaches that appeared left and right.
Categories:
Security world
Week in security
Tags: 0-day exploitadobe flashbig breachesDunkin' DonutsFlash Player zero-dayhumble bundlemac malwareMarriottQuoraunder the radarundetectable malwarezero dayzero day exploit
(Read more...)
|
|
|
|
|
2018-12-10 15:00:05 |
Something else is phishy: How to detect phishing attempts on mobile (lien direct) |
Phishing is more problematic on smartphones than on desktops. Not only that, approaches to handling phishing attacks on mobile are quite different because their techniques are also different. So, how can users sniff out a mobile phish? Let us count the ways.
Categories:
101
How-tos
Tags: ad-networking phishinghomograph attacksHTTPSiOSMobilephishingphishing appsPunycodesmishingSocial Phishingunicodeurl paddingvishing
(Read more...)
|
|
|
|
|
2018-12-07 16:57:03 |
Mac malware combines EmPyre backdoor and XMRig miner (lien direct) |
New Mac malware is using the EmPyre backdoor and the XMRig cryptominer to drain processor power-and possibly worse.
Categories:
Mac
Threat analysis
Tags: backdoorcryptominersmacmac malwarepirated softwareXMRig
(Read more...)
|
Malware
|
|
|
|
2018-12-05 22:44:05 |
New Flash Player zero-day used against Russian facility (lien direct) |
An APT group is using a new Flash Player zero-day that was used a lure targeting a Russian-based clinic
Categories:
Malwarebytes news
Tags: 0dayadobe flashexploitflashFlash ActiveXFlash PlayerFlash Player zero-dayOfficerussiarussianukrainezero day
(Read more...)
|
|
|
|
|
2018-12-05 19:57:05 |
Breaches, breaches everywhere, it must be the season (lien direct) |
Where are all these major breaches coming from? What should we do if we are a victim? And how can we as a company prevent them?
Categories:
101
Business
Privacy
Tags: 1-800-flowersbreachesdata breachDunkin' DonutsEndpoint ProtectionMarriottQuorathreat actor
(Read more...)
|
|
|
|
|
2018-12-05 13:01:04 |
New \'Under the Radar\' report examines modern threats and future technologies (lien direct) |
Malwarebytes released a new report called "Under the Radar: The Future of Undetected Malware" that takes a look at current threats using next generation tricks, and how current security technologies stand up to these threats, as well as the threats to come.
Categories:
Malwarebytes news
Tags: apacartificial intelligencebehavioral detectionblocking at deliveryemeaemotetEternalBlueexploitsfilelessfileless malwarefuture of cybercrimemalicious spamMalwarebytespowershellreportsamsamsorebrecttexastrickbotunder the radarweb blockingweb protectionworm
(Read more...)
|
|
|
|
|
2018-12-04 17:20:02 |
Humble Bundle alerts customers to subscription reveal bug (lien direct) |
Humble Bundle is sending emails to subscribers due to information being revealed by a bug. How bad it is? We take a look.
Categories:
Cybercrime
Social engineering
Tags: 2-Step Verification2fabreachbuggamesgaminghumble bundlephishphishingspear phishingtwo-factor authenticationvideo games
(Read more...)
|
|
|
|
|
2018-12-03 17:06:00 |
A week in security (November 26 – December 2) (lien direct) |
A roundup of last week's security news from November 26 until December 2, including the Marriott breach, AV testing, 2019 security predictions, and an ad fraud botnet takedown.
Categories:
Security world
Week in security
Tags: 2019 predictionsav testingDellESTAfbifingerprintsfraud botnetsLinkedInmarriotNodeJSnodjspredicitimroot certificatesUberwebcams
(Read more...)
|
|
Uber
|
|
|
2018-11-30 19:17:03 |
Marriott breach impacts 500 million customers: here\'s what to do about it (lien direct) |
Read more...)
|
Data Breach
|
|
|
|
2018-11-30 16:00:04 |
The 25th anniversary of the webcam: What did it bring us? (lien direct) |
This month the webcam has been around for 25 years. Ho has it developed and which are the concerns surrounding webcams and CCTVs?
Categories:
Security world
Technology
Tags: botnetcamfetingcctvcryptominingddosIoTwebcam
(Read more...)
|
|
|
|
|
2018-11-28 16:00:00 |
ESTA registration websites still lurk in paid ads on Google (lien direct) |
Google has taken action against advertisements on their network offering ESTA application services at an inflated price. We see if potentially dubious sites are still lurking, using common search terms.
Categories:
Cybercrime
Privacy
Tags: advertadvertisingadvertsESTAGoogleGoogle Adshomeland securitypublic sourcetravelUSGOVvisas
(Read more...)
|
|
|
|
|
2018-11-28 14:00:05 |
Teamwork takes down massive ad fraud botnets (lien direct) |
Malwarebytes joins the fight against ad fraud in one of the largest take down operations.
Categories:
Malwarebytes news
Tags: 3vead fraudfbiMalwarebyteswhite ops
(Read more...)
|
|
|
|
|
2018-11-27 22:44:00 |
Why Malwarebytes decided to participate in AV testing (lien direct) |
Malwarebytes recently participated in the antivirus software for Windows comparison test performed by AV-test.org. This is uncharted territory for us, as we have had reservations about the testing process' inability to capture our best protection technologies. See how we scored, and learn why we maintain the results don't reflect our true capabilities.
Categories:
Malwarebytes news
Tags: AV comparison testsAV testsdetectionsinfection vectormalware deliverytest results
(Read more...)
|
|
|
|
|
2018-11-27 16:00:00 |
Malwarebytes\' 2019 security predictions (lien direct) |
Read more...)
|
|
|
|
|
2018-11-26 18:21:03 |
A week in security (November 19 – 25) (lien direct) |
A roundup of last week's security news from November 19–25, including a business email compromise attack, deep dive into DNA testing kits, and more troubles for Tesla.
Categories:
Security world
Week in security
Tags: AndroiddnaGoogle Playlastpassmalwarephishingroundupteslaweek in security
(Read more...)
|
|
Tesla
LastPass
|
|
|
2018-11-21 17:53:05 |
Spoofed addresses and anonymous sending: new Gmail bugs make for easy pickings (lien direct) |
This isn't the first time that Gmail, an email service used by billions, is found to have flaws. One security researcher discovered two in less than a week; another revealed a weakness that still leaves Android users open to phishing.
Categories:
Cybercrime
Social engineering
Tags: Bleeping Computereli graygmail bugphishertim cottenux flaws
(Read more...)
|
|
|
|
|
2018-11-21 16:00:04 |
Are Deepfakes coming to a scam near you? (lien direct) |
Deepfake is a machine learning technique that is capable of perfect imitations of facial expressions in videos. Will adding voice imitations to them lead to the perfect scam?
Categories:
Social engineering
Technology
Tags: AIceo fraudcoinminersdeep fakedeep learningdeepfakedeepfakesmachine learningscam
(Read more...)
|
Guideline
|
|
|
|
2018-11-20 16:51:05 |
Web skimmers compete in Umbro Brasil hack (lien direct) |
In this web skimming match between two Magecart groups, there can only be one winner.
Categories:
Criminals
Threat analysis
Tags: brasilcredit cardexfiltrationhackJSONMagecartRiskIQskimmingumbroweb
(Read more...)
|
Hack
|
|
|
|
2018-11-20 15:00:00 |
What DNA testing kit companies are really doing with your data (lien direct) |
Consumer DNA testing kits were a top holiday present last season, and are expected to be big sellers again. But should you think twice before hitting the buy button? What's really happening with all your genetic data? We take a deep dive into all the areas of concern-plus what the testing companies are getting right-when it comes to the security of your DNA and the privacy of your sensitive personal information.
Categories:
101
Tags: data storagednagenetic datagenetic infoGINAPIIprivacyprivacy policy
(Read more...)
|
|
|
|
|
2018-11-19 17:08:05 |
A week in security (November 12 – 18) (lien direct) |
A roundup of security news from November 12 to 18, including TrickBot, smart jewelry, Secret Sisters scam, and the compromise of air traffic control.
Categories:
Security world
Week in security
Tags: a week in securityair traffic controlbusiness automationchristmas threatscryptocurrency scamshijackrecapsecret sister scamsmart jewelry privacysmart jewelry securitytrickbotweekly blog roundup
(Read more...)
|
|
|
|
|
2018-11-19 16:00:02 |
Business email compromise scam costs Pathé $21.5 million (lien direct) |
Recently released court documents show European-based cinema chain Pathé lost a small fortune to a business email compromise (BEC) scam in March 2018. The attack cost the company $21.5 million-that's 10 percent of its total earnings. Learn how to avoid BEC scams and keep your company in the black.
Categories:
Cybercrime
Social engineering
Tags: 2faauthenticationbecBusiness Email CompromiseCEOCFOmfapathephishscamtwo-factor authentication
(Read more...)
|
|
|
|
|
2018-11-16 16:00:00 |
6 security concerns to consider when automating your business (lien direct) |
When considering an automation strategy, business representatives must be aware of any security risks involved. Here are six automating concerns network admins and other IT staff should keep in mind.
Categories:
101
Business
Tags: automatingautomationbusinesscybersecurityinsider threatsmalicious insiders
(Read more...)
|
|
|
|
|
2018-11-15 20:12:00 |
Compromising vital infrastructure: air traffic control (lien direct) |
The aviation industry and air traffic (control) are vital elements of our infrastructure. While flying is reportedly safe, how does that landscape look cybersecurity-wise?
Categories:
Business
Cybercrime
Tags: air trafficair traffic controlATCAATOaviationcontroldata breachesdronesEUROCONTROLfreightNotPetyaransomwarespamWannaCry
(Read more...)
|
|
NotPetya
Wannacry
|
|
|
2018-11-14 17:27:02 |
My precious: security, privacy, and smart jewelry (lien direct) |
Fashionable and functional. These are the makings of smart jewelry. They aren't secure, yet some are used to secure user data and online accounts. Should you still buy one?
Categories:
101
FYI
Tags: ant plusANT+BLEbluetooth low energydenial of servicedosgdprInternet of ThingsIoTsleep apnea monitoringsleep monitoringsmart jewelrywearable jewelrywearable techwearable technologyWT
(Read more...)
|
|
|
|
|
2018-11-14 15:00:03 |
TrickBot takes over as top business threat (lien direct) |
There's a newer, more sophisticated banking Trojan in town attempting to penetrate business networks and giving Emotet a run for its money. And its name is TrickBot. Learn how this threat is giving organizations a run for their money.
Categories:
101
Business
Tags: banking Trojanbanking Trojansemotetsmb vulnerabilitytrickbotTrojans
(Read more...)
|
Threat
|
|
|
|
2018-11-13 18:55:04 |
Secret Sister scam returns in time for Christmas (lien direct) |
Secret Sister scams are back, just in time for the holiday season. What is it, and how does it part people from their money? We take a look.
Categories:
Cybercrime
Social engineering
Tags: chain letterfacebookholiday scamspyramid schemePyramid schemesscamsecret santaSecret Sister
(Read more...)
|
|
|
|
|
2018-11-12 17:17:05 |
A week in security (November 5 – November 11) (lien direct) |
A roundup of security news from November 5 to November 11, including bitcoin scams, VirtualBox zero-day, ColdFusion vulnerability, Android security, and cybersecurity training.
Categories:
Security world
Week in security
Tags: bitcoin scamsbitlockercoldfusionelon muskProcess Hackersticky cybersecurity trainingweek in secuirty
(Read more...)
|
|
|
|
|
2018-11-12 15:00:02 |
What\'s new in TrickBot? Deobfuscating elements (lien direct) |
Read more...)
|
Threat
|
|
|
|
2018-11-09 16:16:04 |
Advanced tools: Process Hacker (lien direct) |
A quick introduction to Process Hacker which is a powerful tool that can be used for troubleshooting, debugging, and reverse engineering.
Categories:
How-tos
Technology
Tags: browlockCPUCPU usage percentagememory dumpPIDprocess explorerProcess HackerProcess Identifierresource hog
(Read more...)
|
Tool
|
|
★★★★
|
|
2018-11-08 17:00:00 |
How to create a sticky cybersecurity training program (lien direct) |
Organizations know that training employees is not only expensive but time-consuming. But when it comes to cybersecurity, training is a must. Whether you're an organization of 50 or 50,000, this guide will show you the ropes in creating a cybersecurity training program that works from start to finish.
Categories:
101
Business
Tags: becbusinessBusiness Email Compromisecybersecurity trainingeducationintranetPERI-TRAININGprivacy trainingsecurity trainingtraining and awareness programvpn
(Read more...)
|
|
|
|
|
2018-11-07 16:00:00 |
Google logins: JavaScript now required (lien direct) |
Google now requires users to enable JavaScript before logging in for extra security measures. But wait, hasn't JavaScript been used in cyberattacks? We take a look at the impact of Google's decision.
Categories:
Cybercrime
Privacy
Tags: browsersGoogleGoogle loginsJavaScriptloginloginsphishingsecurity
(Read more...)
|
|
|
|
|
2018-11-06 18:05:01 |
Compromising vital infrastructure: transport and logistics (lien direct) |
Transport and logistics are vital infrastructure, because we need them to deliver our daily necessities, but who is responsible for protecting them?
Categories:
Business
Cybercrime
Tags: cyberattackshackinginfrastructurelogisticsNotPetyaphishingprevent ransomware attacksprotectionransomwaretransportWannaCry
(Read more...)
|
Ransomware
|
NotPetya
Wannacry
|
|
|
2018-11-05 20:37:02 |
Browlock flies under the radar with complete obfuscation (lien direct) |
A new browlock (browser locker) steps up the game once more with soup to nuts obfuscation. Learn more about how it works and what you can do to protect against it.
Categories:
Social engineering
Threat analysis
Tags: Base64browlockchromeextensionMalwarebytes Browser Extensiontech support scamsZepto.js
(Read more...)
|
|
|
|
|
2018-11-05 17:37:04 |
A week in security (October 29 – November 4) (lien direct) |
A roundup of security news from October 29 to November 4, including more problems with home hubs, phishing attack spikes, massively popular ransomware, and spies being charged for blueprint theft.
Categories:
Security world
Week in security
Tags: blueprint theftChromebookcryptocurrencyhackshome hubIoTMalwarebytes Chromebokmicrophonesphishingransomwareweek in security
(Read more...)
|
|
|
|
|
2018-11-01 15:00:00 |
Introducing Malwarebytes for Chromebook (lien direct) |
Introducing Malwarebytes for Chromebook, the Malwarebytes product that can protect your Chromebook against ransomware, adware, and other modern-day malware.
Categories:
Malwarebytes news
Product updates
Tags: ChromebookMalwarebytesMalwareytes for Chromebookprotectionransomwarescan
(Read more...)
|
|
|
|
|
2018-10-31 17:27:03 |
Tomorrowland festival goers affected by data breach (lien direct) |
A data breach from a 2014 Tomorrowland electronic music festival has affected up to 60,000 event-goers caught up in the action.
Categories:
Cybercrime
Privacy
Tags: breachdata breachhackingmusicmusic festivalpaylogicphishingscamsTomorrowland
(Read more...)
|
Data Breach
|
|
|
|
2018-10-31 16:41:00 |
How to tighten security and increase privacy on your browser (lien direct) |
Is your browser secure and private enough by design or do you need to worry about security, privacy, fingerprinting, ads, and cookies yourself?
Categories:
Privacy
Security world
Tags: adsbrowlockbrowserbrowser securitybrowser-based attacksChrome Extensioncontrolcookiescryptominersfingerprintinghijackeronline privacyprivacyPUPsecurityvpnWebRTC
(Read more...)
|
|
|
|
|
2018-10-30 16:00:00 |
Removing the jam in your printer security (lien direct) |
We take a look at printer security, an oft-neglected aspect of locking down an organization's network.
Categories:
101
Tags: Lockdownnetworknetwork adminpaperprinterprinter securityprinterssecurity
(Read more...)
|
|
|
|
|
2018-10-29 17:20:00 |
Mac cryptocurrency ticker app installs backdoors (lien direct) |
A Mac application named CoinTicker has been found installing two different backdoors, capable of keylogging, data theft, execution of arbitrary commands, and more.
Categories:
Mac
Threat analysis
Tags: backdoorcryptocurrencycryptominingevileggmacmac backdoormac cryptocurrency
(Read more...)
|
|
|
|
|
2018-10-29 17:00:00 |
A week in security (October 22 – 28) (lien direct) |
A roundup of security news from October 22 to October 28, including more headaches for airlines, how to avoid being a victim of a sextortion scam, and problems with search engines, browsers, and email.
Categories:
Security world
Week in security
Tags: airlinebad adsBritish Airwayscathartic pacific breachCrypto scamsextortionmac malwaremalwareNorth Koreaphishingvulnerability
(Read more...)
|
|
|
|
|
2018-10-29 15:00:00 |
Mobile Menace Monday: top five scariest mobile threats (lien direct) |
In the spirit of this upcoming Halloween season, we thought we'd provide you with a list of the top five scariest mobile threats in our book.
Categories:
Cybercrime
Mobile
Tags: adupsAndroidandroid ransomwareguerrillaHidden Adsmobidashmobile menace mondaymobile ransomwaremobile threatstriple m
(Read more...)
|
|
|
|
|
2018-10-26 15:00:00 |
Scammers use old browser trick to create fake virus download (lien direct) |
A file downloaded to your computer says it's a virus but turns out to just be a ploy used by tech support scammers.
Categories:
Social engineering
Threat analysis
Tags: browlockbrowser lockersmalwarescamstech supportTSSvirus
(Read more...)
|
|
|
|