Tech support scammers leverage “evil cursor” technique to “lock” Chrome

Tech scammers are constantly coming up with new techniques to make users panic and seek their bogus services. The latest one, documented by Malwarebytes researchers, has been dubbed “evil cursor”. “Evil cursor” The trick works a… Continue reading Tech support scammers leverage “evil cursor” technique to “lock” Chrome

Trend Micro blames data collection issue on code library re-use

Cybersecurity giant Trend Micro has apologized after researchers discovered that a number of the company’s consumer-facing apps were collecting users’ browser histories. Thomas Reed, the lead for Mac and mobile at Malwarebytes, published research last week that discovered a number of MacOS apps were exfiltrating sensitive data to servers controlled by the developer. A number of these apps – Dr. Cleaner, Dr. Cleaner Pro, Dr. Antivirus, Dr. Unarchiver, Dr. Battery and Duplicate Finder — are owned and operated by Japan-based Trend Micro. Apple normally places tight restrictions on what data app developers can collect. Yet Read found that the apps were pulling data that they should not have had access to. With regard to Dr. Antivirus, Reed found the app was pulling complete browsing and search history from Chrome, Firefox, Safari and the App store. Additionally, the app also created a file that “contained detailed information about every application found […]

The post Trend Micro blames data collection issue on code library re-use appeared first on Cyberscoop.

Continue reading Trend Micro blames data collection issue on code library re-use

Nearly 15% of US security budgets go to remediating active compromises

Malwarebytes and Osterman Research have polled 900 senior IT decision-makers and IT security professionals in Australia, Germany, the US, UK, and Singapore about the impact of enterprise security incidents on their bottom line, and also looked at all s… Continue reading Nearly 15% of US security budgets go to remediating active compromises

Cybercrime tactics & techniques Q2 2018

The last quarter is likely the last hurrah of the campaigns and attacks we’ve been seeing over the last 6 months. What comes next may completely change the game. Check out our latest Cybercrime Tactics & Techniques report to find out more abo… Continue reading Cybercrime tactics & techniques Q2 2018

We block shady ad blockers

Some of you have reached out to us concerning Malwarebytes blocking of certain Ad blocking extensions, or an influx in web blocking notifications.  First things first, this is not a False Positive. 
Categories:

Cybercrime

Tags: adblo… Continue reading We block shady ad blockers

Did my comment on your blog get lost?

Automatic filters on our blog sometimes catch benign comments in their nets. However, they also protect users from spammers, scammers, and malicious links. Read on to learn about our comment policy: what we block and why.
Categories:

101
FYI

Ta… Continue reading Did my comment on your blog get lost?

Week in security (April 30 – May 6)

A roundup of security news from April 30 – May 6, including Necurs malspam, Spartacus ransomware, Twitter passwords, and cybersecurity studies.
Categories:

Security world
Week in security

Tags: MalwarebytesnecursransomwaresecuritySpartac… Continue reading Week in security (April 30 – May 6)

Week in security (April 09 – April 15)

A roundup of the security news from April 09 – April 16, including fake updates, safe messaging, and Facebook spammers. And our quarterly CTNT report is out.
Categories:

Security world
Week in security

Tags: encryptionfacebookFakeUpdatesM… Continue reading Week in security (April 09 – April 15)