Bank robbers 2.0: digital thievery and stolen cryptocoins

A new generation of thieves, bank robbers 2.0, seek to steal huge amounts of money as anonymously as they can. So they've developed a multitude of ways to pilfer cryptocurrency. Categories: Cybercrime Technology Tags: bakcoinhivecrypto-currencyjackpottingmalleabilityMt GoxNicehashPieter Arntzrobber (Read more...) The post Bank robbers 2.0: digital thievery and stolen cryptocoins appeared first on Malwarebytes Labs.
Read more

Stolen security logos used to falsely endorse PUPs

To gain the trust of users, the makers of PUPs put the logos of reputable security and tech firms on their websites to imply their product is endorsed by the companies. They are not. Categories: 101 Social engineering Tags: logosMcAfeemicrosoftmisleadingnortonPieter ArntzPUPs (Read more...) The post Stolen security logos used to falsely endorse PUPs appeared first on Malwarebytes Labs.
Read more

New Chrome and Firefox extensions block their removal to hijack browsers

Two new extensions in Firefox and Chrome force install then hide from the user. Learn how you can protect yourself against them and remove them manually. Categories: Malware Threat analysis Tags: blockedchromeextensionsfirefoxnormal removalPieter Arntz (Read more...) The post New Chrome and Firefox extensions block their removal to hijack browsers appeared first on Malwarebytes Labs.
Read more

Free tools: Internet traffic monitoring

There are many reasons why you might want to start Internet traffic monitoring, especially if you're a security enthusiast or amateur analyst. We list some free tools that have different use cases. Categories: 101 Technology Tags: bitmeterfiddlernetwork monitoringresmonResource Monitortcpviewurl revealerwindowswireshark (Read more...) The post Free tools: Internet traffic monitoring appeared first on Malwarebytes Labs.
Read more

How cryptocurrency mining works: Bitcoin vs. Monero

Why threat actors prefer mining for Monero rather than for the very hot Bitcoin cryptocurrency? Let us point out some possible reasons. Categories: Security world Technology Tags: bitcoinBlockExplorerBlockHashblocknumbercryptocurrencyminingmonero (Read more...) The post How cryptocurrency mining works: Bitcoin vs. Monero appeared first on Malwarebytes Labs.
Read more

Blockchain technology: not just for cryptocurrency

We've talked about how cryptocurrency uses blockchain technology. Now we take a closer look at its other applications, and why blockchain is on the brink of changing the world. Categories: Security world Technology Tags: blockchaindecentralizeddistributedintermediaryledgersmart contracts (Read more...) The post Blockchain technology: not just for cryptocurrency appeared first on Malwarebytes Labs.
Read more

How the EU intends to battle fake news

The EU has announced to launch of a public consultation and the setup of a high-level expert group in the battle against fake news and online disinformation. Categories: Government Social engineering Tags: EUfake newshigh level experts grouponline disinformationpublic consultation (Read more...) The post How the EU intends to battle fake news appeared first on Malwarebytes Labs.
Read more
Page 1 of 3123