What can you do as a scammer when no legitimate payment provider wants to process your payments anymore? Or, what if…
Month: May 2020
Lock and Code S1Ep6: Recognizing facial recognition’s flaws with Chris Boyd
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet….
Data privacy law updates eyed by Singapore
In early 2019, Singapore’s data privacy regulators proposed that the country’s data privacy law could use two new updates—a data breach…
New Mac variant of Lazarus Dacls RAT distributed via Trojanized 2FA app
This blog post was authored by Hossein Jazi, Thomas Reed and Jérôme Segura. We recently identified what we believe is a…
Credit card skimmer masquerades as favicon
Malware authors are notorious for their deceptive attempts at staying one step ahead of defenders. As their schemes get exposed, they…
Explained: cloud-delivered security
As a counterpart to security for your assets in the cloud, you may also run into solutions that offer security from…
A week in security (April 27 – May 3)
Last week on Malwarebytes Labs, we looked at how secure the cloud is, understood why unexpected demand can influence an organization…
What to do when you receive an extortion email
In the last few weeks, there has been an upswing in people receiving threatening, extortion email messages, demanding payment to avoid…