Ghost Has Arrived

Credit to Author: Ghanshyam More| Date: Fri, 14 Dec 2018 11:58:50 +0000

On the back of an upswing in Ransomware activity, we decided to carry out an in-depth analysis of Ghost Ransomware. Interesting fact about this malware is that it uses multiple components to encrypt user files. Technical Analysis : Main malware executable (Ghost.exe) is compiled using the DotNet Framework. The infection…

Read more

Data scraping treasure trove found in the wild

Credit to Author: Christopher Boyd| Date: Tue, 11 Dec 2018 16:56:54 +0000

3 large databases containing scraped content landed in front of security researchers. How bad is it?

Categories:

Tags:

(Read more…)

The post Data scraping treasure trove found in the wild appeared first on Malwarebytes Labs.

Read more

Gmail encryption: Everything you need to know

Credit to Author: JR Raphael| Date: Thu, 22 Nov 2018 04:00:00 -0800

Encryption may sound like a subject best left to hackers and tinfoil hat wearers, but don’t be fooled: It’s a critical part of contemporary life and something that’s important for everyone, especially business users, to understand. And one of the places where encryption is most relevant and misunderstood is in the realm of email.

If you’re using Gmail for electronic communication — be it for business, for personal use, or a combination of the two — it’s well worth your while to know how the service does and doesn’t secure your information and what steps you can take to make sure you’re getting the level of privacy you need.

Ready to dive in?

To read this article in full, please click here

Read more

How to differentiate between spam and phishing emails?

Credit to Author: Sushmita Kalashikar| Date: Thu, 11 Oct 2018 10:58:52 +0000

Emails today have become an integral part of our day-to-day life and this has made it a child’s play for spammers to lure people into opening fraudulent emails and attachments. Thus, while you are using emails for your everyday personal or official use, it is important to realize that the…

Read more

Emerging trend of spreading malware through IQY files

Credit to Author: Prashant Tilekar| Date: Wed, 03 Oct 2018 10:05:14 +0000

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver malware through IQY file. Till now we had seen spread of malware through various file types and chains such as Word document, Script, JAVA files. Fig 1: Attack chain IQY file…

Read more

100 channels and nothing on, except TV Licensing phishes

Credit to Author: Christopher Boyd| Date: Tue, 25 Sep 2018 09:00:00 +0000

A recent bout of TV Licensing phishing emails promise British users a refund once they log in to a phony TV License website and provide payment details. Read on to see if you’ve been impacted.

Categories:

Tags:

(Read more…)

The post 100 channels and nothing on, except TV Licensing phishes appeared first on Malwarebytes Labs.

Read more

5 safe ways to get back at spammers: a guide to wasting time

Credit to Author: Christopher Boyd| Date: Tue, 11 Sep 2018 15:00:00 +0000

We take a look at some of the safe ways to waste a spammer’s time, whether by email or telephone.

Categories:

Tags:

(Read more…)

The post 5 safe ways to get back at spammers: a guide to wasting time appeared first on Malwarebytes Labs.

Read more