Be Very Sparing in Allowing Site Notifications

An increasing number of websites are asking visitors to approve “notifications,” browser modifications that periodically display messages on the user’s mobile or desktop device. In many cases these notifications are benign, but several dodgy firms are paying site owners to install their notification scripts and then selling that communications pathway to scammers and online hucksters. Continue reading Be Very Sparing in Allowing Site Notifications

What’s the real value—and danger—of smart assistants?

Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they’re dangerous, and other times downright hilarious. What’s the real value in these devices?
Categories:

Security world
Technology

Tags: alexaassistant… Continue reading What’s the real value—and danger—of smart assistants?

Can we trust our online project management tools?

Online project management tools can be not only useful, but a lifeline for developers and PMs who juggle multiple tasks with competing deadlines. How can we use them in a secure way?
Categories:

Business
Security world

Tags: breachcloudmanageme… Continue reading Can we trust our online project management tools?

DDoS attacks are growing: What can businesses do?

How do DDoS attacks work? And how do we protect our organizations from the growing size and number of attacks?
Categories:

Business
Technology

Tags: attackddosDDos attackIoTmemcachedPieter Arntzprotection

(Read more…)

The post DDoS … Continue reading DDoS attacks are growing: What can businesses do?

Bank robbers 2.0: digital thievery and stolen cryptocoins

A new generation of thieves, bank robbers 2.0, seek to steal huge amounts of money as anonymously as they can. So they’ve developed a multitude of ways to pilfer cryptocurrency.
Categories:

Cybercrime
Technology

Tags: bakcoinhivecrypto-currency… Continue reading Bank robbers 2.0: digital thievery and stolen cryptocoins

Stolen security logos used to falsely endorse PUPs

To gain the trust of users, the makers of PUPs put the logos of reputable security and tech firms on their websites to imply their product is endorsed by the companies. They are not.
Categories:

101
Social engineering

Tags: logosMcAfeemicrosoft… Continue reading Stolen security logos used to falsely endorse PUPs

New Chrome and Firefox extensions block their removal to hijack browsers

Two new extensions in Firefox and Chrome force install then hide from the user. Learn how you can protect yourself against them and remove them manually.
Categories:

Malware
Threat analysis

Tags: blockedchromeextensionsfirefoxnormal removalPiet… Continue reading New Chrome and Firefox extensions block their removal to hijack browsers

Facebook worries: I didn’t post that

What could have happened when you find Facebook posts or messages that you didn’t post or send? And what are the actions you can take to prevent further abuse?

Categories:

Tags:

(Read more…)

The post Facebook worries: I didn’t post that appeared first on Malwarebytes Labs.

Continue reading Facebook worries: I didn’t post that