phishing

QuickHealSecurity

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

Credit to Author: Aniruddha Dolas| Date: Wed, 25 Jul 2018 13:40:33 +0000

Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques and variants to deliver malware on a victim. Attackers are smart and they use complex techniques to avoid detection. At the start of 2017, we had seen the emotet campaign spreading through…

Read More
MalwareBytesSecurity

When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained

Credit to Author: Jovi Umawing| Date: Thu, 12 Jul 2018 16:42:06 +0000

Maybe it’s the quirky way some tech writers abbreviate it, or the surreal way it reminded you of that popular Michael Jackson song. Whatever triggers you to remember the term, for most of us, man-in-the-middle embodies something both familiar yet mysterious. Let’s get to know this threat a little bit better, shall we?

Categories:

Tags:

(Read more…)

The post When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained appeared first on Malwarebytes Labs.

Read More
MicrosoftSecurity

Machine learning vs. social engineering

Credit to Author: Windows Defender ATP| Date: Thu, 07 Jun 2018 13:00:56 +0000

Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new and unknown threats. Just in the last few months, machine learning has helped us to protect hundreds of thousands of customers against ransomware,

Read more

Read More
MalwareBytesSecurity

A week in security (June 25 – July 1)

Credit to Author: Malwarebytes Labs| Date: Mon, 02 Jul 2018 17:56:24 +0000

A round up of the security news from June 25 – July 1, including a look at the EU cyber force proposal, cryptomining dialing things down, and the risks of handing out personal information online.

Categories:

Tags:

(Read more…)

The post A week in security (June 25 – July 1) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Five easy ways to recognize and dispose of malicious emails

Credit to Author: Pieter Arntz| Date: Tue, 19 Jun 2018 15:00:00 +0000

What should you check for to determine if an email is spam or malicious? Here are five red flags to look for—and what to do with those malicious emails when you find them.

Categories:

Tags:

(Read more…)

The post Five easy ways to recognize and dispose of malicious emails appeared first on Malwarebytes Labs.

Read More