Recently, at the SAS conference I talked about “Funky malware formats”—atypical executable formats used by malware that are only loaded by…
Month: April 2019
Explained: like-farming
Like-farming, aka like-harvesting, is a method used by commercial parties and scammers alike to raise the popularity of a site or…
Malware targeting industrial plants: a threat to physical security
We live in a world where more and more manufacturing processes are controlled by computers that send instructions to robots. This…
Hackers snab emails and more in Microsoft Outlook, Hotmail, and MSN compromise
Long-time users of certain Microsoft products, such as Hotmail, MSN, and Outlook found they may be wrapped up in a hack…
Electrum Bitcoin wallets under siege
By Adam Thomas and Jérôme Segura, with additional contributions from Vasilios Hioueras and S!Ri Since at least late December 2018, many…
Ellen DeGeneres giveaway scam spreading on social media
Scammers are pushing multiple fake Facebook profiles of Ellen DeGeneres, popular US TV show host and producer, with the goal of…
A week in security (April 8 – 14)
Last week on Labs, we said hello to Baldr, a new stealer on the market, we wondered who is managing the…
Fake Instagram assistance apps found on Google Play are stealing passwords
We all want those Instagram likes and followers. Many apps on Google Play claim they can assist you with that effort….
What is personal information? Or personally identifiable information? In legal terms, it depends
In early March, cybersecurity professionals around the world filled the San Francisco Moscone Convention Center’s sprawling exhibition halls to discuss and…
Who is managing the security of medical management apps?
One truth that is consistent across every sector—be it technology or education—is that software is vulnerable, which means that any device…