ALL POSTS Electrum DDoS botnet reaches 152,000 infected hosts Malwarebytes Labs April 29, 2019 0 Comments By Jérôme Segura, Adam Thomas, and S!RiWe have been closely monitoring the situation involving the continued attacks against users of the… A week in security (April 22 – 28) Malwarebytes Labs April 29, 2019 0 Comments Last week on Labs, we looked at security threats to headphones, privacy options in the world of law, and wandered through… GitHub hosted Magecart skimmer used against hundreds of e-commerce sites Jérôme Segura April 26, 2019 0 Comments Every day, new e-commerce websites fall into the hands of one of the many Magecart skimmers. Unbeknownst to shoppers, criminals are… Labs Cybercrime Tactics and Techniques report finds businesses hit with 235 percent more threats in Q1 Wendy Zamora April 25, 2019 0 Comments The Malwarebytes Labs Cybercrime Tactics and Techniques Q1 2019 report found businesses at the butt end of a bad joke. In… A look inside the FBI’s 2018 IC3 online crime report Christopher Boyd April 24, 2019 0 Comments The FBI’s Internet Crime Complaint Center have released their annual Crime Report, with the most recent release focusing on 2018. While… Consumers have few legal options for protecting privacy David Ruiz April 23, 2019 0 Comments There are no promises in the words, “We care about user privacy.” Yet, these words appear on privacy policy after privacy… Of hoodies and headphones: a spotlight on risks surrounding audio output devices Jovi Umawing April 22, 2019 0 Comments More than a decade ago, cardiologists from the Beth Israel Medical Center in Boston presented their findings at the American Heart… A week in security (April 15 – 21) Malwarebytes Labs April 22, 2019 0 Comments Last week, Malwarebytes Labs revealed multiple giveaway online scam campaigns banking on the popularity (and generosity) of Ellen DeGeneres, weighed in… “Funky malware format” found in Ocean Lotus sample hasherezade April 19, 2019 0 Comments Recently, at the SAS conference I talked about “Funky malware formats”—atypical executable formats used by malware that are only loaded by… Previous 1 … 364 365 366 367 368 … 614 Next Contributors Threat Center Podcast Glossary Scams