ALL POSTS Equifax aftermath: How to protect against identity theft Malwarebytes Labs September 14, 2017 0 Comments Who here is scrambling around in the aftermath of the recent breach at Equifax to figure out if you’ve been compromised? Who here… Crowdsourced fraud and kickstarted scams William Tsing September 14, 2017 0 Comments Crowdsourced funding opportunities via Kickstarter, Patreon, and GoFundMe have removed many structural roadblocks for people to access capital quickly and conveniently…. Remediation vs. prevention: How to place your bets Sarah Enderby September 13, 2017 0 Comments Building a security environment for businesses these days is a gamble: layer on too much and your programs may be canceling… PSA: New Microsoft Word 0day used in the wild Jérôme Segura September 13, 2017 0 Comments Microsoft has just patched an important vulnerability in Microsoft Word during its latest patch Tuesday cycle. According to the security firm… Multiple flaws found in smart syringe pump Jovi Umawing September 13, 2017 0 Comments A syringe pump is a small infusion pump that delivers liquids, either medication or nutrients, in small quantities into the patient’s system…. Compromised LinkedIn accounts used to send phishing links via private message and InMail Jérôme Segura September 12, 2017 0 Comments Phishing continues to be a criminals’ favorite for harvesting user credentials with more or less sophisticated social engineering tricks. In this… A week in security (September 4 – September 10) Malwarebytes Labs September 11, 2017 0 Comments Last week, we looked into expired domain names being used for malvertising, delved into dubious Facebook apps, and checked out Chinese… Fake DHS email – “Give us $350 in the next 24 hours” Christopher Boyd September 8, 2017 0 Comments Who likes threats? Nobody, as it turns out. That hasn’t stopped scammers from jumping on the menacing email train – next… Equifax breach: What you need to know [updated] Malwarebytes Labs September 8, 2017 0 Comments [updates 9/14/2017]Equifax has released information and confirmed the vulnerability (CVE-2017-5638) that was used in this breach after several days of intense… Previous 1 … 424 425 426 427 428 … 614 Next Contributors Threat Center Podcast Glossary Scams