Please note: For privacy reasons the identity of the hacked account in the example used for this blog has been changed. In our previous email security education blog we reviewed trending email security threats. In this blog, weâd like to show you what a phishing campaign looks like, and its scary consequences. Bad actors (hackers, spammers, scammers, […]
Articles
Explained: Sage ransomware
MALWARE | THREAT ANALYSIS Posted: March 29, 2017 by Malwarebytes Labs Last updated: March 30, 2017 Sage is yet another ransomware that has become a common threat nowadays. Similarly to Spora, it has capabilities to encrypt files offline. The malware is actively developed and currently, we are facing an outbreak of version 2.2. of this […]
Java and Flash top list of most outdated programs on users’ PCs
Most outdated programs Gathered anonymously from 116 million Windows desktop and laptop users, Avast found the most outdated programs include: Java (Runtime 6,7) Flash Player (Active X) Foxit Reader GOM Media Player Nitro Pro WinZip DivX Adobe Shockwave Player 7-ZIP Firefox. Topping this list of the least updated applications is Java, with more than 24 […]
Top 5 Cybercrime Vectors You Need To Be Aware Of
Attacks on the internet are getting more sophisticated. Every week it seems another large enterprise finds a hacked database or intrusion of some sort, often attributed to state actors. There are more places than ever where you might be vulnerable. So here are five cybercrime vectors to be aware of: 1. The browser. Yes it’s […]
Security in 2017: Ransomware will remain king
MALWARE | THREAT ANALYSIS Posted December 14, 2016 by Malwarebytes Labs 2016 was the year of ransomware, with hackers focusing their attention on exploiting Internet users and businesses around the world for profit. According to the FBI, cyberextortion losses have skyrocketed and ransomware was on track to become a $1 billion a year crime in […]
Six tips for practicing safe social media
Article: The impact of industrial Internet of things on Cybersecurity With Facebook now counting over 1.7 billion monthly users and LinkedIn another 467 million, it was only a matter of time until criminal hackers turned their attention to exploiting social media as an attack vector. The current attack is being waged to introduce ransomware into […]
How to tell if you’re infected with malware
101 | How-tos Posted May 6, 2016 by Wendy Zamora Picture this: you start your computer and wait. And wait. And wait some more. When your desktop finally shows its face, things donât get any better. Your Internet is sluggish, your programs are taking forever to load, and your cursor is dragging 20 seconds behind […]
Should you store your data in the cloud?
It’s pretty simple to understand where a file goes when you save it on your PC. It lives on your hard drive, possibly housed in a set of folders you’ve created and organized yourself. That file is only stored on your computer, unless you decide to email it to yourself or save it on an […]