Hackers Attempt To Extort Apple

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 22 Mar 2017 13:42:55 +0000

Briefcase full of moneyCybercrime is a business. Professional criminals refine their processes, measure performance, and regularly evaluate the return on their investments. Every move is strategic. We see this time and time again with ransomware campaigns and throughout the underground. Which is why the latest report from Joseph Cox at Motherboard is mind boggling. Joseph brings us the…

Read more

Twitter app spams Fappening bait and Amazon surveys

Credit to Author: Christopher Boyd| Date: Mon, 20 Mar 2017 13:37:07 +0000

With news of another so-called Fappening (nude photos of celebrities distributed without permission) doing the rounds, it was inevitable that scammers would look to take advantage. We’ve already seen message board aficionados warn others of dodgy download links and random Zipfiles claiming to contain stolen nude photos and video clips, but today we’re going to look…

Categories:

Tags:

(Read more…)

The post Twitter app spams Fappening bait and Amazon surveys appeared first on Malwarebytes Labs.

Read more

Adware vs. ad fraud

Credit to Author: Pieter Arntz| Date: Mon, 13 Mar 2017 18:18:36 +0000

We explain what adware and ad fraud are and point out the differences by discussing the methods and the classification of the malware that is involved.

Categories:

Tags:

(Read more…)

The post Adware vs. ad fraud appeared first on Malwarebytes Labs.

Read more

How not to phish a security researcher on Twitter

Credit to Author: Christopher Boyd| Date: Tue, 14 Mar 2017 15:00:00 +0000

What happens when a phisher decides to try and directly phish a security researcher on Twitter? This.

Categories:

Tags:

(Read more…)

The post How not to phish a security researcher on Twitter appeared first on Malwarebytes Labs.

Read more

Adware vs. Ad-fraud

Credit to Author: Pieter Arntz| Date: Mon, 13 Mar 2017 18:18:36 +0000

We explain what adware and ad fraud are and point out the differences by discussing the methods and the classification of the malware that is involved.

Categories:

Tags:

(Read more…)

The post Adware vs. Ad-fraud appeared first on Malwarebytes Labs.

Read more

The Culture of Cybercrime in West Africa

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Thu, 09 Mar 2017 11:00:52 +0000

As part of our ongoing research into the cybercriminal underground markets of the world, Trend Micro researchers today released a report detailing Cybercrime in West Africa. This report leverages our ongoing partnership with INTERPOL to provide survey data and a deeper understanding of the regions cybercriminal ecosystem. While tactics play a role in the success…

Read more

A multi-purpose fake online scanner

Credit to Author: Pieter Arntz| Date: Tue, 07 Mar 2017 16:00:14 +0000

Just to show you that behind some PUPs there are threat actors that are too lazy to be bothered, we offer you a fake online scanner that was used to promote the infamous MacKeeper and a Windows system optimizer called Advance-System-Care.

Categories:

Tags:

(Read more…)

The post A multi-purpose fake online scanner appeared first on Malwarebytes Labs.

Read more