Twitter app spams Fappening bait and Amazon surveys

Credit to Author: Christopher Boyd| Date: Mon, 20 Mar 2017 13:37:07 +0000

With news of another so-called Fappening (nude photos of celebrities distributed without permission) doing the rounds, it was inevitable that scammers would look to take advantage. We’ve already seen message board aficionados warn others of dodgy download links and random Zipfiles claiming to contain stolen nude photos and video clips, but today we’re going to look…

Categories:

Tags:

(Read more…)

The post Twitter app spams Fappening bait and Amazon surveys appeared first on Malwarebytes Labs.

Read more

Adware vs. ad fraud

Credit to Author: Pieter Arntz| Date: Mon, 13 Mar 2017 18:18:36 +0000

We explain what adware and ad fraud are and point out the differences by discussing the methods and the classification of the malware that is involved.

Categories:

Tags:

(Read more…)

The post Adware vs. ad fraud appeared first on Malwarebytes Labs.

Read more

How not to phish a security researcher on Twitter

Credit to Author: Christopher Boyd| Date: Tue, 14 Mar 2017 15:00:00 +0000

What happens when a phisher decides to try and directly phish a security researcher on Twitter? This.

Categories:

Tags:

(Read more…)

The post How not to phish a security researcher on Twitter appeared first on Malwarebytes Labs.

Read more

Adware vs. Ad-fraud

Credit to Author: Pieter Arntz| Date: Mon, 13 Mar 2017 18:18:36 +0000

We explain what adware and ad fraud are and point out the differences by discussing the methods and the classification of the malware that is involved.

Categories:

Tags:

(Read more…)

The post Adware vs. Ad-fraud appeared first on Malwarebytes Labs.

Read more

The Culture of Cybercrime in West Africa

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Thu, 09 Mar 2017 11:00:52 +0000

As part of our ongoing research into the cybercriminal underground markets of the world, Trend Micro researchers today released a report detailing Cybercrime in West Africa. This report leverages our ongoing partnership with INTERPOL to provide survey data and a deeper understanding of the regions cybercriminal ecosystem. While tactics play a role in the success…

Read more

A multi-purpose fake online scanner

Credit to Author: Pieter Arntz| Date: Tue, 07 Mar 2017 16:00:14 +0000

Just to show you that behind some PUPs there are threat actors that are too lazy to be bothered, we offer you a fake online scanner that was used to promote the infamous MacKeeper and a Windows system optimizer called Advance-System-Care.

Categories:

Tags:

(Read more…)

The post A multi-purpose fake online scanner appeared first on Malwarebytes Labs.

Read more

Malwarebytes Labs Presents: The Cybercrime Tactics and Techniques Report

Credit to Author: Malwarebytes Labs| Date: Mon, 06 Mar 2017 18:04:31 +0000

In our first wrap-up of the threat landscape, we are going to cover the trends observed during the last few months of 2016, provide an analyst’s view of the threats, and offer some predictions for the beginning of 2017. Moving forward, every quarter we will bring you a view of the threat landscape through the eyes of Malwarebytes researchers and analysts.

Categories:

Tags:

(Read more…)

The post Malwarebytes Labs Presents: The Cybercrime Tactics and Techniques Report appeared first on Malwarebytes Labs.

Read more