Search results: malware

Who's to Blame for Hacked Social Media Accounts?

Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware

In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part. They ...
Mario movie malware might maliciously mess with your machine

Mario movie malware might maliciously mess with your machine

| | Security News
There are probably few among us who, never have they ever, downloaded questionable content. Whether it was a hit song in the Napster era or a Blockbuster movie you found on a ...
SHARED INTEL: From airbags to malware: vehicle cyber safety arises in the age of connected cars

SHARED INTEL: From airbags to malware: vehicle cyber safety arises in the age of connected cars

In an increasingly interconnected world, the evolution of the automotive industry presents an exciting yet daunting prospect. Related: Privacy rules for vehicles As vehicles continue to offer modern features such as app-to-car ...
Protecting Software Developers from Malware with AI/ML Insights

Protecting Software Developers from Malware with AI/ML Insights

In my last post I talked about solutions to address malware and the increase in attacks. Today I’ll dig into what’s necessary to find and avoid malware ...
Life finds a way: OneNote malware on the rise

Life finds a way: OneNote malware on the rise

| | Security News
Macro viruses have been a security nightmare for years. First appearing in 1995, they didn’t start gaining global popularity until 1999, when the Melissa virus showed up. Melissa virus was distributed via ...
(Ab)using Adobe Acrobat Sign to distribute malware

(Ab)using Adobe Acrobat Sign to distribute malware

| | Security News
Bad actors have been distributing malware through email for decades. Over time, security technology has evolved and improved greatly, making this task harder for cybercriminals. 20 years ago, we witnessed the frequent ...

Android app signing keys leaked and used to sign malware

| | Security News
One of the most important pillars of Android security is the cryptographic signature key used by developers. Android app updates require that the sign key from the older app on your phone ...

SEO poisoning: Beware of suspicious links to avoid malware infections

| | Security News
Getting infected with malware isn’t just clicking on an errant file, but it usually occurs because an entire ecosystem is created by attackers to fool you into actually doing the click. This ...

Secure Guardrails