The lucrative business of Bitcoin sextortion scams

Credit to Author: Threat Intelligence Team| Date: Thu, 22 Aug 2019 15:00:00 +0000

Sextortion scams are back on the radar, and many say they’re on the uptick. We investigate an email campaign to see how lucrative the business of sextortion can be.

Categories:

Tags:

(Read more…)

The post The lucrative business of Bitcoin sextortion scams appeared first on Malwarebytes Labs.

Read more

Who Owns Your Wireless Service? Crooks Do.

Credit to Author: BrianKrebs| Date: Wed, 07 Aug 2019 22:43:58 +0000

Incessantly annoying and fraudulent robocalls. Corrupt wireless company employees taking hundreds of thousands of dollars in bribes to unlock and hijack mobile phone service. Wireless providers selling real-time customer location data, despite repeated promises to the contrary. A noticeable uptick in SIM-swapping attacks that lead to multi-million dollar cyberheists. If you are somehow under the impression that you — the customer — are in control over the security, privacy and integrity of your mobile phone service, think again. And you’d be forgiven if you assumed the major wireless carriers or federal regulators had their hands firmly on the wheel.

Read more

Helping survivors of domestic abuse: What to do when you find stalkerware

Credit to Author: David Ruiz| Date: Mon, 01 Jul 2019 16:51:59 +0000

Starting today, we’re doing more to protect stalkerware victims than improve our detection capabilities. We’re helping survivors understand how to tell if they’re being watched on their devices—and how to safely get out of the situation.

Categories:

Tags:

(Read more…)

The post Helping survivors of domestic abuse: What to do when you find stalkerware appeared first on Malwarebytes Labs.

Read more

Google’s Nest fiasco harms user trust and invades their privacy

Credit to Author: davidruiz| Date: Wed, 13 Mar 2019 16:30:29 +0000

Last month, Google announced that its Nest Secure would be updated to work with Google Assistant software. The problem? Google never told users its product had a microphone to begin with. Simple oversight or invasion of privacy? We break it down.

Categories:

Tags:

(Read more…)

The post Google’s Nest fiasco harms user trust and invades their privacy appeared first on Malwarebytes Labs.

Read more

Supreme Court: Police Need Warrant for Mobile Location Data

Credit to Author: BrianKrebs| Date: Fri, 22 Jun 2018 20:30:13 +0000

The U.S. Supreme Court today ruled that the government needs to obtain a court-ordered warrant to gather location data on mobile device users. The decision is a major development for privacy rights, but experts say it may have limited bearing on the selling of real-time customer location data by the wireless carriers to third-party companies.

Read more

New EU Privacy Law May Weaken Security

Credit to Author: BrianKrebs| Date: Thu, 15 Feb 2018 17:11:30 +0000

Companies around the globe are scrambling to comply with new European privacy regulations that take effect a little more than three months from now. But many security experts are worried that the changes being ushered in by the rush to adhere to the law may make it more difficult to track down cybercriminals and less likely that organizations will be willing to share data about new online threats. On May 25, 2018, the General Data Protection Regulation (GDPR) takes effect. The law, enacted by the European Parliament, requires technology companies to get affirmative consent for any information they collect on people within the European Union. Organizations that violate the GDPR could face fines of up to four percent of global annual revenues.

Read more

Is it Time to Can the CAN-SPAM Act?

Credit to Author: BrianKrebs| Date: Sun, 02 Jul 2017 16:14:42 +0000

Regulators at the U.S. Federal Trade Commission (FTC) are asking for public comment on the effectiveness of the CAN-SPAM Act, a 14-year-old federal law that seeks to crack down on unsolicited commercial email. Judging from an unscientific survey by this author, the FTC is bound to get an earful.

Read more