Verified Twitter accounts compromised, get busy spamming

Verified Twitter accounts tend to be a little more secure than those belonging to non-verified users due to the amount of extra hoop jumping required to get one of those ticks in the first place. A number of security requirements, including providing a phone number and setting up 2FA, are all things a would-be verified Twitter user needs to do. Unfortunately, things can still go wrong…

Read more

Malwarebytes Labs Blog Comment Safari

Today we’re looking at some comments on our blogs we got from spammers who apparently don’t look too closely at which site they’re at before they hit “Send”.

Read more

Post-holiday spam campaign delivers Neutrino Bot

Spammers took a break over the holidays but are back in form with a campaign pushing the Neutrino Bot.

Read more

Fake Forbes story becomes bearer of “smart drug” news

Scams of this nature doesn’t only arrive via email. They may also be shared via social networking platforms, chat sessions, public comments on forums and blog posts, and (if legitimate websites aren’t careful) sometimes they’re inadvertently shared via ads on sites, especially if user browsing is done via mobile devices.

Read more

A week in security (Nov 27 – Dec 03)

A compilation of notable security news and blog posts from the 27th of November to the 3rd of December. This week, we touched on Gooligan, attribution, a new WhatsApp phishing campaign, another ransomware, and a one-of-a-kind Apple spam.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language