A Look at Scan4You and the Counter Antivirus Service Landscape

Credit to Author: Jon Clay (Global Threat Communications)| Date: Thu, 02 Aug 2018 17:30:09 +0000

The concept of antivirus (AV) scanning within IT security is simple and effective. These programs, which have become part and parcel of typical infrastructure and data protection strategies, scan enterprise networks for known malware signatures and other processes associated with suspicious hacker activity. If and when these signatures or processes are detected, the antivirus program…

The post A Look at Scan4You and the Counter Antivirus Service Landscape appeared first on .

Read more

Social engineering attacks: What makes you susceptible?

Credit to Author: Jovi Umawing| Date: Thu, 02 Aug 2018 15:00:00 +0000

Cybercriminals will do what it takes to get what they want, whether that’s breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here’s how to tell if you’re susceptible to social engineering attacks, and what to do to combat them.

Categories:

Tags:

(Read more…)

The post Social engineering attacks: What makes you susceptible? appeared first on Malwarebytes Labs.

Read more

What’s in the spam mailbox this week?

Credit to Author: Christopher Boyd| Date: Tue, 31 Jul 2018 15:00:27 +0000

We take a look at a few of the most notable spam emails in circulation over the last week, including a money muling scam, Apple phishes, and a sexploitation message featuring old, but real, passwords.

Categories:

Tags:

(Read more…)

The post What’s in the spam mailbox this week? appeared first on Malwarebytes Labs.

Read more

New Android P includes several security improvements

Credit to Author: Gleb Malygin| Date: Fri, 27 Jul 2018 19:12:28 +0000

With its release around the corner, we take a close look at the Android P security improvements and how the newest version of Android will better protect the privacy and data of its users.

Categories:

Tags:

(Read more…)

The post New Android P includes several security improvements appeared first on Malwarebytes Labs.

Read more

Trojans: What’s the real deal?

Credit to Author: Christopher Boyd| Date: Wed, 25 Jul 2018 15:40:47 +0000

We take a fresh look at Trojans: the history of the term, the most popular threats over the years, the different types of Trojans, and their relationship with social engineering.

Categories:

Tags:

(Read more…)

The post Trojans: What’s the real deal? appeared first on Malwarebytes Labs.

Read more

Mobile Menace Monday: Adware MobiDash gets stealthy

Credit to Author: Nathan Collier| Date: Mon, 23 Jul 2018 15:00:50 +0000

Adware MobiDash, an ad-displaying nuisance, now comes with some additional stealth features. As a result, these features hide the existence of Adware MobiDash—even when it’s in plain sight.

Categories:

Tags:

(Read more…)

The post Mobile Menace Monday: Adware MobiDash gets stealthy appeared first on Malwarebytes Labs.

Read more

Cybercrime tactics & techniques Q2 2018

Credit to Author: Malwarebytes Labs| Date: Tue, 17 Jul 2018 12:05:00 +0000

The last quarter is likely the last hurrah of the campaigns and attacks we’ve been seeing over the last 6 months. What comes next may completely change the game. Check out our latest Cybercrime Tactics & Techniques report to find out more about what you may encounter next quarter.

Categories:

Tags:

(Read more…)

The post Cybercrime tactics & techniques Q2 2018 appeared first on Malwarebytes Labs.

Read more

We block shady ad blockers

Credit to Author: Malwarebytes Labs| Date: Wed, 11 Jul 2018 18:15:23 +0000

Some of you have reached out to us concerning Malwarebytes blocking of certain Ad blocking extensions, or an influx in web blocking notifications.  First things first, this is not a False Positive. 

Categories:

Tags:

(Read more…)

The post We block shady ad blockers appeared first on Malwarebytes Labs.

Read more