Virus / Malware

Retour à Sécurité

Malwarebytes

    • 30 septembre 2020Introducing VideoBytes, by Malwarebytes Labs
      We have exciting news for avid readers of Malwarebytes Labs: This week, we’re launching a new, monthly video series that will feature the research, insights, and commentary of our own Adam Kujawa, security evangelist and a director for Malwarebytes Labs. Welcome to VideoBytes, our little corner of threat cinema on the web. The stories we’ll cover in VideoBytes will be similar to the trustworthy ne …

    • 29 septembre 2020Caught in the payment fraud net: when, not if?
      Sometimes, I think there are three certainties in life: death, taxes, and some form of payment fraud. Security reporter Danny Palmer experienced this a little while ago, and has spent a significant amount of time tracking the journey of his card details from the UK to Suriname. His deep-dive confirmed that it is easy to become tangled up in fraud, even if you’re very careful. I myself have experie …

    • 28 septembre 2020Lock and Code S1Ep16: Investigating digital vulnerabilities with Samy Kamkar
      This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk to Samy Kamkar, chief security officer and co-founder of Open Path, about the digital vulnerabilities in our physical world. If you look through a recent history of hacking, you’ll find the clear significance of experimentation. In 2015, security resear …

    • 24 septembre 2020Taurus Project stealer now spreading via malvertising campaign
      For the past several months, Taurus Project—a relatively new stealer that appeared in the spring of 2020—has been distributed via malspam campaigns targeting users in the United States. The macro-laced documents spawn a PowerShell script that invokes certutil to run an autoit script ultimately responsible for downloading the Taurus binary. Taurus was originally built as a fork by the developer beh …

    • 24 septembre 2020Sandbox in security: what is it, and how it relates to malware
      To better understand modern malware detection methods, it’s a good idea to look at sandboxes. In cybersecurity, the use of sandboxes has gained a lot of traction over the last decade or so. With the plethora of new malware coming our way every day, security researchers needed something to test new programs without investing too much of their precious time. Sandboxes provide ideal, secluded environ …

    • 23 septembre 2020Phishers spoof reliable cybersecurity training company to garner clicks
      “It happens to the best of us.” And, indeed, no adage is better suited to a phishing campaign that recently made headlines. Fraudsters used the brand, KnowBe4—a trusted cybersecurity company that offers security awareness training for organizations—to gain recipients’ trust, their Microsoft Outlook credentials, and other personally identifiable information (PII). This is according to f …

    • 21 septembre 2020A week in security (September 14 – 20)
      Last week on Malwarebytes Labs, we looked at Fintech industry developments, specifically the differences between Europe and the US, and we analyzed how some charities and the advertising industry are tied together. We also told readers about what companies can do to counter domain name abuse. In our Lock and Code podcast we talked to Pieter Arntz about safely using Google Chrome Extensions. Other …

    • 18 septembre 2020Is domain name abuse something companies should worry about?
      Even though some organizations and companies may not realize it, their domain name is an important asset. Their web presence can even make or break companies. Therefor, “domain name abuse” is something that can ruin your reputation. Losing control There are several ways in which perpetrators can abuse your good name to make a profit for themselves, while ruining your good name in the p …

    • 17 septembre 2020Charities and the advertising industry: data ecosystems and privacy risks
      Data makes the world go round, more often than not via advertising and its tracking mechanisms. Whether you think making money from large volumes of PII to keep the web ticking over is a good thing, or a sleazy data-grab often encouraging terrible ad practices, it’s not going to go away anytime soon. Charity advertising is an important feature of revenue generation for UK-based charitable organisa …

    • 15 septembre 2020Fintech industry developments, differences between Europe and the US
      “Put your money in the bank and you can watch it grow.” If there is a statement that shows us how much the financial world has changed it’s this one. With the introduction of negative interest, companies and consumers with a large amount of liquid assets are looking for a different way to handle those assets. This is where the innovative fintech industry comes into play. What is fintech? The hardw …

ESET

    • 25 septembre 2020Week in security with Tony Anscombe
      A bug let hijack Firefox browsers on other phones over Wi-Fi – NIST’s new tool can help firms understand why staff fall for phishing – Almost 200 arrested in a dark web crackdown The post Week in security with Tony Anscombe appeared first on WeLiveSecurity …

    • 25 septembre 20205 tips for better Google Drive security
      As cloud storage solutions are becoming more and more popular, we look at several simple steps you can take to secure your files on Google Drive The post 5 tips for better Google Drive security appeared first on WeLiveSecurity …

    • 23 septembre 2020179 arrested in massive dark web bust
      The sting is said to be the US Government’s largest operation targeting crime in the internet’s seedy underbelly The post 179 arrested in massive dark web bust appeared first on WeLiveSecurity …

    • 18 septembre 2020Week in security with Tony Anscombe
      Zoom now supports two-factor authentication – A cyber attack hits 14 inboxes belonging to Quebec’s Department of Justice The post Week in security with Tony Anscombe appeared first on WeLiveSecurity …

    • 18 septembre 20205 ways cybercriminals can try to extort you
      What are some common strategies cybercriminals employ in extortion schemes and how can you mitigate the chances of falling victim to a cyber-shakedown? The post 5 ways cybercriminals can try to extort you appeared first on WeLiveSecurity …

    • 17 septembre 2020Plugging in a strange USB drive – What could possibly go wrong?
      While wanting to return a found USB flash drive is commendable, you should avoid taking unnecessary risks, lest your device get infested and your data compromised The post Plugging in a strange USB drive – What could possibly go wrong? appeared first on WeLiveSecurity …

ESET Support