Social engineering

MalwareBytesSecurity

Sextortion scammers getting creative

Credit to Author: William Tsing| Date: Tue, 26 Nov 2019 17:09:34 +0000

We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of…

Categories:

Tags:

(Read more…)

The post Sextortion scammers getting creative appeared first on Malwarebytes Labs.

Read More
QuickHealSecurity

Pegasus like spyware could be snooping on you right now!!

Credit to Author: Sushmita Kalashikar| Date: Fri, 22 Nov 2019 13:08:42 +0000

The recent news of Pegasus spyware attack via WhatsApp that targeted lawyers, journalists and human rights activists, offers an astonishing revelation on the kind of havoc such spyware can create. We covered the topic extensively, recently. The frequent media buzz about the recent incident of snooping by Pegasus spyware which…

Read More
MalwareBytesSecurity

Deepfakes and LinkedIn: malign interference campaigns

Credit to Author: Christopher Boyd| Date: Wed, 20 Nov 2019 16:00:00 +0000

Don’t discount deepfakes just yet. We may not be fooled by phony Mark Zuckerberg anymore, but the discovery of a fake LinkedIn profile sporting a deepfake avatar shows how social engineering can deceive through the mundane.

Categories:

Tags:

(Read more…)

The post Deepfakes and LinkedIn: malign interference campaigns appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Help prevent disaster donation scams from causing more misery

Credit to Author: Christopher Boyd| Date: Wed, 30 Oct 2019 20:36:21 +0000

Scammers will stop at nothing—not even a tragic natural disaster—for a chance to cash in. We offer some helpful tips to avoid disaster donation scams.

Categories:

Tags:

(Read more…)

The post Help prevent disaster donation scams from causing more misery appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

How to protect yourself from doxing

Credit to Author: Osama Tahir| Date: Fri, 25 Oct 2019 15:37:31 +0000

Doxing, or collecting and spreading private information about a user online, is a form of cyber harassment, stalking, and even a potential threat to physical safety. Here’s what you can do to protect yourself against it.

Categories:

Tags:

(Read more…)

The post How to protect yourself from doxing appeared first on Malwarebytes Labs.

Read More