Top Menu

IT Security News

Malwarebytes Labs The Security Blog From Malwarebytes

  • All the reasons why cybercriminals want to hack your phone
    by Kayla Matthews on December 18, 2018 at 4:00 pm

    Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn't they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it. Categories: 101 FYI Tags: Androidappscryptomininghack your phonehackingiOSloapimining cryptocurrencyMobilemobile phonesmobile ransomwaremobile securityransomwareransomware attack (Read more...) The post All the reasons why cybercriminals want to hack your phone appeared first on Malwarebytes Labs. […]

  • Mobile Menace Monday: Is Fuchsia OS the end of Android?
    by Gleb Malygin on December 17, 2018 at 8:10 pm

    The next major Android version will be Android Q and not Android 9.1 Pie. In parallel, Google is also developing a new operating system based on its own microkernel called Fuchsia. Will this be the OS that replaces Android? Read on to find out. Categories: Cybercrime Mobile Tags: AndroidflutterfuchsiaGooglemobile menace mondayoperating systemtriple mZircon (Read more...) The post Mobile Menace Monday: Is Fuchsia OS the end of Android? appeared first on Malwarebytes Labs. […]

  • A week in security (December 10 – 16)
    by Malwarebytes Labs on December 17, 2018 at 5:58 pm

    A roundup of last week's security news from December 10–16, including facial recognition technology, abandoned USB sticks, even more trouble at Facebook, Google bugs, and more. Categories: Security world Week in security Tags: AndroidBitcoin bomb threatbugfacebookmac malwarepasswordsSMB vulnerabilitiesUSB stickswindows 10 (Read more...) The post A week in security (December 10 – 16) appeared first on Malwarebytes Labs. […]

  • How threat actors are using SMB vulnerabilities
    by Pieter Arntz on December 14, 2018 at 4:00 pm

    SMB vulnerabilities have been so successful for criminals that they’ve been used in some of the most devastating ransomware and Trojan attacks of the last two years. Learn how they work and how your organization can protect against them. Categories: 101 Business Tags: EternalBlueEternalChampionEternalRomanceexploitsNSA toolsShadowBrokersSMB vulnerabilitiesvulnerabilities (Read more...) The post How threat actors are using SMB vulnerabilities appeared first on Malwarebytes Labs. […]

  • Compromising vital infrastructure: the power grid
    by Pieter Arntz on December 13, 2018 at 4:00 pm

    How are we doing at protecting the vital infrastructure of our power grid and its components against physical and cyberattacks? Categories: Business Cybercrime Tags: backupblackenergyblackoutcrashoverridecyberattacksdragonflynrcNuclearOPECpower gridrenewable energysandwormstuxnet (Read more...) The post Compromising vital infrastructure: the power grid appeared first on Malwarebytes Labs. […]