Virus / Malware

Retour à Sécurité

Malwarebytes

    • A week in security (February 17 – 23) 24 février 2020
      Last week on Malwarebytes Labs, we highlighted the benefits and concerns of identity-as-a-service (IDaaS), an identity management scheme deployed from the cloud; reported on scammers and squatters taking advantage of Rudy Giuliani’s Twitter typos; and gave a high-level overview of RobbinHood, the latest ransomware baddie to specifically target organizations. Other cybersecurity news Hundreds of Is …

    • Why managed service providers (MSP) are critical for business continuity 24 février 2020
      With the threat landscape becoming more hostile to businesses, small- and medium-sized businesses (SMBs) are often finding it difficult to cope. Hence, they turn to managed service providers (MSPs) for help, not only to keep their businesses going—the concept known as business continuity—but also to offer salve to known pain points that encompass all industries. Short-staffed One of the recognized …

    • Threat spotlight: RobbinHood ransomware takes the driver’s seat 20 février 2020
      Despite their name, the RobbinHood cybercriminal gang is not stealing from the rich to give to the poor. Instead, these ransomware developers are more like big game hunters—attacking enterprise organizations and critical infrastructure and keeping all the spoils for themselves. In 2019, the RobbinHood ransomware creators successfully attacked and received ransom payouts from the cities of Baltimor …

    • Rudy Giuliani’s Twitter mishaps invite typosquatters and scammers 19 février 2020
      Former cybersecurity czar Rudy Giuliani has been targeted by typosquatters on Twitter, thanks to copious misspellings and other keyboarding errors made in a number of his public tweets. In a tweet sent out on Sunday, Giuliani meant to send his 650,000-plus followers to his new website, RudyGiulianics.com. Instead, a space added after “Rudy” sent users on a redirection quest that ultima …

    • Harnessing the power of identity management (IDaaS) in the cloud 18 février 2020
      Sometimes, consumers have it easy. Take, for example, when they accidentally lock themselves out of their personal email. Their solution? Reset the password. With one click, they’re able to change their old, complicated password with a new, more memorable one. Self-service password reset is awesome like this. For users on a business network, it’s not so simple. That is, unless they …

    • A week in security (February 10 – 16) 18 février 2020
      Last week on Malwarebytes Labs, we explained how to battle online coronavirus scams with facts, discussed the persistent re-infection techniques of Android/Trojan.xHelper and how to remove it, provided cyber tips for safe online dating, and showed how Hollywood teaches us misleading cybersecurity lessons. We also released the 2020 State of Malware Report describing the threat landscape of the year …

    • Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack 14 février 2020
      In pop culture, cybercrimes are often portrayed as mysterious and unrealistic. Hackers are enigmatic and have extraordinary tech abilities. They can discover top secrets in a short time and type at breakneck speed to hack into a database. In real life, though, hacking is not that straightforward. Hackers may have technical capabilities and high intelligence, but they are otherwise normal human bei …

    • Cyber tips for safe online dating: How to avoid privacy gaffs, exploits, and scams 13 février 2020
      Research and reporting on this article were conducted by Labs writers Chris Boyd and David Ruiz. Dating apps have been mainstream for a long time now, with nearly every possible dating scene covered—casual, long-term, gay, poly, of the Jewish faith, interested only in farmers—whatever you’re looking for. Sadly, wherever you find people trying to go about their business, you’ll also fin …

    • Android Trojan xHelper uses persistent re-infection tactics: here’s how to remove 12 février 2020
      We first stumbled upon the nasty Android Trojan xHelper, a stealthy malware dropper, in May 2019. By mid-summer 2019, xHelper was topping our detection charts—so we wrote an article about it. After the blog, we thought the case was closed on xHelper. Then a tech savvy user reached out to us in early January 2020 on the Malwarebytes support forum: “I have a phone that is infected wit …

    • Malwarebytes Labs releases 2020 State of Malware Report 11 février 2020
      Today is Safer Internet Day—and what better way to celebrate/pay homage than to immerse yourself in research on the latest in malware, exploits, PUPs, web threats, and data privacy? It so happens we’ve got just the right content to kick-start the party because today we released the results of our annual study on the state of malware—the 2020 State of Malware Report—and as usual, it’s a …

    • Battling online coronavirus scams with facts 10 février 2020
      Panic and confusion about the recent coronavirus outbreak spurred threat actors to launch several malware campaigns across the world, relying on a tried-and-true method to infect people’s machines: fear. Cybercriminals targeted users in Japan with an Emotet campaign that included malicious Word documents that allegedly contained information about coronavirus prevention. Malware embedded into PDFs, …

    • A week in security (February 3 – 9) 10 février 2020
      Last week on Malwarebytes Labs, we looked at Washington state’s latest efforts in providing better data privacy rights for their residents, and we dove into some of the many questions regarding fintech: What is it? How secure is it? And what are some of the problems in the space? We also detailed a new adware family that our researchers had been tracking since late last year and pushed out a piece …

    • Google Maps: online interventions with offline ramifications 7 février 2020
      The places where online life directly intersection with that lived offline will be forever fascinating, illustrated perfectly through a recent performance piece involving Google Maps, a cart, and an awful lot of mobile phones. Simon Weckert, an artist based in Berlin, Germany, showed how a little ingenuity could work magic on the ubiquitous Google Maps system. Turns out Google hadn’t accounted for …

    • Adposhel adware takes over browser push notifications administration 6 février 2020
      Since late last year, our researchers have been monitoring new methods being deployed by cybercriminals to potentially abuse browser push notifications. Now, an adware family detected by Malwarebytes as Adware.Adposhel is doing just that, taking control of push notifications in Chrome at the administrator level. What does Adposhel adware do? The adware uses Chrome policies to ensure that notificat …

    • Fintech security: the challenges and fails of a new era 5 février 2020
      “I have no idea how this app from my bank works, and I don’t trust what I don’t understand.” Josh is not an old curmudgeon or luddite. He’s 42 with a decent understanding of technology. Nevertheless, the changes in fintech have come too fast for him. It’s not that he doesn’t trust his bank. He doesn’t trust himself to use and manage the banking app s …

    • Washington Privacy Act welcomed by corporate and nonprofit actors 4 février 2020
      The steady parade of US data privacy legislation continued last month in Washington with the introduction of an improved bill that would grant state residents the rights to access, control, delete, and port their data, as well as opting out of data sales. The bill, called the Washington Privacy Act, also improves upon its earlier 2019 version, providing stronger safeguards on the use of facial rec …

    • A week in security (January 27 – February 2) 3 février 2020
      Last week on Malwarebytes Labs, we looked at the strengths and weaknesses of the Zero Trust model, gave you the low-down on spear phishing, and took a delve into the world of securing the managed service provider (MSP). Other cybersecurity news UN compromised via Sharepoint hack: An extraordinary tale highlighting that absolutely nobody is safe when bad things happen and are then covered up. (Sour …

    • Securing the MSP: why they’re their own worst enemy 30 janvier 2020
      We’ve previously discussed threats to managed service providers (MSPs), covering their status as a valuable secondary target to both an assortment of APT groups as well as financially motivated threat groups. The problem with covering new and novel attack vectors, however, is that behind each new vector is typically a system left unpatched, asset management undone, a security officer not hir …

    • Spear phishing 101: what you need to know 29 janvier 2020
      Phishing, a cyberattack method as old as viruses and Nigerian Princes, continues to be one of the most popular means of initiating a breach against individuals and organizations, even in 2020. The tactic is so effective, it has spawned a multitude of sub-methods, including smishing (phishing via SMS), pharming, and the technique du jour for this blog: spear phishing. But first, a quick parable. A …

    • Explained: the strengths and weaknesses of the Zero Trust model 28 janvier 2020
      In a US court of law, the accused are deemed to be innocent until proven guilty. In a Zero Trust security model, the opposite is true. Everything and everyone must be considered suspect—questioned, investigated, and cross-checked—until we can be absolutely sure it is safe to be allowed. Zero Trust is a concept created by John Kindervag in 2010 during his time as Vice President and Principal Analys …

ESET

    • Is your phone listening to you? 24 février 2020
      Do social media listen in on our conversations in order to target us with ads? Or are we just a bit paranoid? A little test might speak a thousand words. The post Is your phone listening to you? appeared first on WeLiveSecurity …

    • Week in security with Tony Anscombe 21 février 2020
      Hunting down Linux threats – The implications of DNS encryption for business security – MGM Resorts breach hits millions of people The post Week in security with Tony Anscombe appeared first on WeLiveSecurity …

    • Up close and personal with Linux malware 21 février 2020
      What are the main security threats facing Linux? A Q&A with ESET Senior Malware Researcher Marc‑Etienne M.Léveillé, whose work has been instrumental in uncovering a number of malware strains hitting Linux servers. The post Up close and personal with Linux malware appeared first on WeLiveSecurity …

    • Linux and malware: Should you worry? 20 février 2020
      Malicious code is nothing to worry about on Linux, right? Hold your penguins. How Linux malware has gone from the sidelines to the headlines. The post Linux and malware: Should you worry? appeared first on WeLiveSecurity …

    • Sensitive plastic surgery photos exposed online 18 février 2020
      Other leaked records include videos, facial and body scans, as well as a range of patients’ personal data The post Sensitive plastic surgery photos exposed online appeared first on WeLiveSecurity …

    • FC Barcelona Twitter account hacked – again 17 février 2020
      The same hackers have also gotten their mitts on social media accounts of other high-profile sporting targets The post FC Barcelona Twitter account hacked – again appeared first on WeLiveSecurity …

    • Week in security with Tony Anscombe 14 février 2020
      How to spot and online dating scam – Almost 100 vulnerabilities fixed this Patch Tuesday – Cyber-risks in esports The post Week in security with Tony Anscombe appeared first on WeLiveSecurity …

    • PayPal remains the most‑spoofed brand in phishing scams 14 février 2020
      WhatsApp also emerges as a favorite target for brand impersonation amid a general spike in social media phishing The post PayPal remains the most‑spoofed brand in phishing scams appeared first on WeLiveSecurity …

    • FBI: Cybercrime losses tripled over the last 5 years 13 février 2020
      On the upside, the Bureau recovered more than US$300 million in funds lost to online scams last year The post FBI: Cybercrime losses tripled over the last 5 years appeared first on WeLiveSecurity …

    • Digital addiction: How to get your children off their screens 13 février 2020
      What are some of the common signs that your children may be screen addicts and what can you do to limit their screen time? The post Digital addiction: How to get your children off their screens appeared first on WeLiveSecurity …

    • Competing in esports: 3 things to watch out for 11 février 2020
      If you’re looking to become a pro gamer, there are risks you shouldn’t play down The post Competing in esports: 3 things to watch out for appeared first on WeLiveSecurity …

    • Week in security with Tony Anscombe 7 février 2020
      How digital forensics helps bring criminals to justice – Beef up your Facebook privacy – Take a quiz to test your phish-spotting prowess The post Week in security with Tony Anscombe appeared first on WeLiveSecurity …

    • Critical Bluetooth bug leaves Android users open to attack 7 février 2020
      Google releases a fix for the security hole that, if left unplugged, could allow attackers to run malicious code with no user interaction The post Critical Bluetooth bug leaves Android users open to attack appeared first on WeLiveSecurity …

ESET Support