SMS authentication code includes ad: a very bad idea
We look at a recent incident where a Google SMS authentication user encountered an add attached to the code sent out. Categories: Privacy Tags: 2 factor auth2 factor authenticationadvertscarriercodesMobileprivacysms (Read more...) The post SMS authentication code includes ad: a very bad idea appeared first on Malwarebytes Labs ... Read More
Official Cardi B website plagued by spammers
Over the past few days, fans of singer Cardi B noticed her website was slowly filling up with spam. We take a look at what happened. Categories: Cybercrime Privacy Tags: blog commentscardi bcardibdevelopersgdprmoderationonline privacyprivacyspamspammersvideoswebsite. spamyoutube (Read more...) The post Official Cardi B website plagued by spammers appeared first on Malwarebytes ... Read More
The digital entropy of death: BSides Manchester
What happens to online accounts when we die? Not a cheerful subject by any stretch of the imagination, but one we covered at BSides Manchester. Categories: Tags: after we diebsidesBSides Manchesterdeathdigital entropy of deathdigital real estatelink rotsocial media (Read more...) The post The digital entropy of death: BSides Manchester appeared ... Read More
What’s in the spam mailbox this week?
We take a look at a few of the most notable spam emails in circulation over the last week, including a money muling scam, Apple phishes, and a sexploitation message featuring old, but real, passwords. Categories: Cybercrime Social engineering Tags: Appleemailmalspamphishingsexploitationspam (Read more...) The post What’s in the spam mailbox ... Read More
Trojans: What’s the real deal?
We take a fresh look at Trojans: the history of the term, the most popular threats over the years, the different types of Trojans, and their relationship with social engineering. Categories: Cybercrime Malware Tags: botnetddosdownloadermalwareMobileratTrojansvirus (Read more...) The post Trojans: What’s the real deal? appeared first on Malwarebytes Labs ... Read More
The danger of third parties: ads, pipelines, and plugins
We take a look at the perils of the tools and services embedded into the websites you use on a daily basis, thanks to the development help of third parties. Categories: FYI Tags: ad networksadsbreachphonespipelinesupply chainthird party (Read more...) The post The danger of third parties: ads, pipelines, and plugins ... Read More
IoT domestic abuse: What can we do to stop it?
A disturbing new use of technology against loved ones has come to light: Internet of Things (IoT) domestic abuse cases are being reported, and security experts are wondering how best to tackle this new problem. What is it? And more importantly, what can we do to fight it? Categories: Cybercrime ... Read More
Major data breaches at Adidas, Ticketmaster pummel web users
There's been a number of major data breaches and leaks revealed in the last few days, and we take a look at three of the biggest: Adidas, Ticketmaster, and marketing firm Exactis. Categories: Cybercrime Privacy Tags: adidasadvertisingbreachcarddataexactisleakpaymentrecordsticketmaster (Read more...) The post Major data breaches at Adidas, Ticketmaster pummel web users ... Read More
Red Hen website suffers SEO spam compromise
A website belonging to an eatery currently making waves in the news has been compromised with SEO spam. We take a look at what's happened, and explain what the hackers are up to. Categories: Cybercrime Hacking Tags: blackhatcompromisehackedSEOSEO spamspamwordpress (Read more...) The post Red Hen website suffers SEO spam compromise ... Read More
World Cup 2018: malware attacks gunning for goal
The World Cup is in full swing, and attackers are busy both on and off the pitch. Which of the competing nations are under fire from malware authors? Who is sailing through qualifying rounds mostly untouched? What are the most popular threats in the midst of the biggest footballing nations? ... Read More