ALL POSTS Researchers discover vulnerabilities in smart assistants’ voice commands Jovi Umawing May 30, 2018 0 Comments Virtual personal assistants (VPA), also known as smart assistants like Amazon’s Alexa and Google’s Assistant, are in the spotlight for vulnerabilities to… Two major Canadian banks blackmailed after alleged data breach Jérôme Segura May 29, 2018 0 Comments While the US was celebrating Memorial Day on Monday, Canada was dealing with an unusual data breach affecting two popular financial… SEO poisoning: Is it worth it? Pieter Arntz May 29, 2018 0 Comments Search Engine Optimization (SEO) poisoning basically comes down to getting your web page high in the rankings for relevant search results… A week in security (May 21 – May 27) Malwarebytes Labs May 28, 2018 0 Comments Last week we told you about a Mac cryptominer using XMRig, an overview of Dreamcast related scams, part 1 of decoding… Malware analysis: decoding Emotet, part 1 Vishal Thakur May 25, 2018 0 Comments Emotet Banking Trojan malware has been around for quite some time now. As such, infosec researchers have made several attempts to… Happy anniversary to Dreamcast…and its scams Christopher Boyd May 24, 2018 0 Comments This month marks 20 years since the legendary SEGA Dreamcast console was first announced. Looked on fondly by gamers, it revolutionised… Why bad coding habits die hard—and 7 ways to kill them Jovi Umawing May 23, 2018 0 Comments Developers are usually the focus of blame when software vulnerabilities cause organizational breaches. (Sometimes, quality assurance engineers are included in the… New Mac cryptominer uses XMRig Thomas Reed May 22, 2018 0 Comments A new Mac cryptominer was discovered this week, after affected users saw their fans whirring out of control and a process… Malwarebytes CrackMe 2: contest summary hasherezade May 22, 2018 0 Comments About three weeks ago, we published our second CrackMe. It triggered a lot of interest, and we got many high-quality write-ups…. Previous 1 … 399 400 401 402 403 … 617 Next Contributors Threat Center Podcast Glossary Scams