All 101 Cybercrime Malwarebytes news PUP Security world Threat analysis

January 26, 2018 - Until a recent fix was applied, users of the VR pornography app SinVR could have found their subscriber information up for grabs.

CONTINUE READINGNo Comments

January 12, 2018 - A 28-year-old Ohio programmer is charged with creating the Fruitfly malware to spy on thousands of unsuspecting victims and produce child pornography.

CONTINUE READINGNo Comments

December 21, 2017 - This year saw a handful of spectacularly bad security fails that resulted in massive sets of compromised data. Here are the most colossal data breaches of 2017.

CONTINUE READINGNo Comments

December 6, 2017 - Internet of Things technology may soon multiply in the billions. But security for these devices is practically non-existent. What needs to be done to secure IoT users now and in the future?

CONTINUE READING5 Comments

September 8, 2017 - On July 29, 2017, Equifax discovered that attackers had gained unauthorized access to private data belonging to an estimated 143 million Americans by exploiting a vulnerability in a website application.

CONTINUE READING3 Comments

April 14, 2017 - ShadowBrokers shocked the security world again today by releasing another cache of exploits, files, and operational documents purportedly stolen from Equation Group last summer. As you may recall from our earlier publications, Equation Group is reportedly a clandestine hacking group that has been linked with NSA hacking tools.

CONTINUE READINGNo Comments

April 10, 2017 - GameStop confirmed with KrebsOnSecurity that they are currently investigating reports of hackers breaching their network and siphoning customer information.

CONTINUE READINGNo Comments

April 10, 2017 - ShadowBrokers finally made good on their promise to release the decryption key to unlock the stolen 'auction' file purportedly filled with NSA hacking tools.

CONTINUE READINGNo Comments

April 8, 2017 - The common conception of cyber attacks is kind of like bad weather: ranging from irritating to catastrophic, but always unpredictable. Hackers are simply too sophisticated to draw any reliable judgments on and we shouldn’t try. As it turns out, some hackers are fairly predictable in their successful use of really dumb attacks.

CONTINUE READINGNo Comments

October 25, 2016 - Over the years we’ve done analysis on tech support scammers to include their tactics, infrastructure, front companies, payment mechanisms, and even how they hire. But one question that comes up frequently from security researchers is how a group of criminals, who are by most accounts computer illiterate, set up tech support scams that require a hard minimum of technical expertise, troubleshooting, and maintenance?

CONTINUE READING1 Comment

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language