Hackers: They’ll turn your computer into a BOMB! “Hackers turning computers into bombs” is a now legendary headline, taken from the…
Month: August 2020
Chrome extensions that lie about their permissions
“But I checked the permissions before I installed this pop-up-blocker—it said nothing about changing my searches,” my dad retorts after I…
Dutch ISP Ziggo demonstrates how not to inform your customers about a security flaw
“Can you have a look at this email I got, please?” my brother asked. “It looks convincing enough, but I don’t…
The skinny on the Instacart breach
The COVID-19 outbreak has affected many facets of our lives—from how we visit our families, socialize with friends, meet with colleagues,…
SBA phishing scams: from malware to advanced social engineering
A number of threat actors continue to take advantage of the ongoing coronavirus pandemic through phishing scams and other campaigns distributing…
A week in security (August 3 – 9)
Last week on Malwarebytes Labs, on our Lock and Code podcast, we talked about identity and access management technology. We also…
Inter skimming kit used in homoglyph attacks
As we continue to track web threats and credit card skimming in particular, we often rediscover techniques we’ve encountered elsewhere before….
Data Accountability and Transparency Act of 2020 looks beyond consent
In the United States, data privacy is hard work—particularly for the American people. But one US Senator believes it shouldn’t have…
Business email compromise: gunning for goal
The evergreen peril of business email compromise (BEC) finds itself in the news once more. This time, major English Premier League…
Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet….