ALL POSTS Google and Microsoft accused of feeding smaller search engines spam ads Malwarebytes Labs February 25, 2022 0 Comments Google and Microsoft appear to have been flooding their smaller search engine rivals with spam ads, to limit the number of… Yik Yak “cyberbullying”: What can be done? Jovi Umawing February 24, 2022 0 Comments In August 2021, Yik Yak, the once-popular anonymous social media platform on Android and iOS, made a comeback after shutting its… How to update your drivers and when you need to Pieter Arntz February 24, 2022 0 Comments Many software vendors have a driver updater in their arsenal. But is it really that important to have the latest computer… Cyclops Blink malware: US and UK authorities issue alert Pieter Arntz February 24, 2022 0 Comments According to a joint security advisory published yesterday by US and UK cybersecurity and law enforcement agencies, a new malware called… Hive ransomware: Researchers figure out a method to decrypt files Pieter Arntz February 23, 2022 0 Comments Files encrypted by ransomware can’t be recovered without obtaining the decryption key, if the encryption has been done properly. But that… Xenomorph banking Trojan downloaded over 50,000 times from Play Store Pieter Arntz February 22, 2022 0 Comments Besides the name of the creature that “stars” in the Alien movies by 20thCentury Fox, Xenomorph is also the name given… “Ethnicity recognition” tool listed on surveillance camera app store built by fridge-maker’s video analytics startup David Ruiz February 22, 2022 0 Comments The bizarre promotional videopromises “Face analysis based on best of breed Artificial Intelligence algorithms for Business Intelligence and Digital Signage applications.”… Facebook sued for siphoning facial recognition data without consent Jovi Umawing February 21, 2022 0 Comments Ken Paxton, the Attorney General of Texas, recently filed a lawsuit against Facebook’s parent company, Meta, for harvesting the facial recognition… CISA offers guidance on dealing with information manipulation Pieter Arntz February 21, 2022 0 Comments Malicious actors use influence operations, like spreading false information, to shape public opinion, undermine trust, amplify division, and create dissension. In… Previous 1 … 249 250 251 252 253 … 619 Next Contributors Threat Center Podcast Glossary Scams