Filing your taxes? Be wary of help found through search engines

Credit to Author: Christopher Boyd| Date: Thu, 14 Apr 2022 12:42:07 +0000

We take a look at search results related to installing tax software at a crucial time in the tax reporting window.

The post Filing your taxes? Be wary of help found through search engines appeared first on Malwarebytes Labs.

Read more

Stalkerware-type detections hit record high in 2021, but fell in second half

Credit to Author: David Ruiz| Date: Thu, 14 Apr 2022 12:31:39 +0000

In 2021, detections for spyware-type apps reached their highest peak ever, but amidst the record-setting numbers, the volume of detections actually decreased in the second half of the year.

The post Stalkerware-type detections hit record high in 2021, but fell in second half appeared first on Malwarebytes Labs.

Read more

“Your AppI‌e‌ ‌l‌D‌ ‌‌h‌‌a‌‌s‌‌ ‌‌b‌‌e‌‌e‌‌n‌‌ ‌‌l‌‌ocke‌‌d‌‌” spam email takes you on a website mystery tour

Credit to Author: Christopher Boyd| Date: Thu, 14 Apr 2022 10:53:25 +0000

We take a look at what appears to be a phish, but ends up directing you to endless random websites instead.

The post “Your AppI‌e‌ ‌l‌D‌ ‌‌h‌‌a‌‌s‌‌ ‌‌b‌‌e‌‌e‌‌n‌‌ ‌‌l‌‌ocke‌‌d‌‌” spam email takes you on a website mystery tour appeared first on Malwarebytes Labs.

Read more

Apple has good privacy arguments, but critics aren't listening

Credit to Author: Jonny Evans| Date: Wed, 13 Apr 2022 09:41:00 -0700

Apple CEO Tim Cook this week warned that regulators are on the edge of making poor decisions that will impact our future during a passionate speech in defense of personal privacy and his company’s business models at the Global Privacy Summit in Washington DC.

Neither good nor evil

The thrust of Cook’s argument is that privacy and security are essential building blocks of trust for a technologically advanced society. But that huge potential is being constrained by surveillance and insecurity.

To read this article in full, please click here

Read more

Cybersecurity Basics: Authentication and Authorization

Credit to Author: Melanie Tafelski| Date: Wed, 13 Apr 2022 00:00:00 +0000

With most security incidents caused by exposed secrets in DevOps pipelines and tools, proper authentication and authorization is essential. Explore the basics of strong identity management to build more resilient apps.

Read more

Dismantling ZLoader: How malicious ads led to disabled security tools and ransomware

Credit to Author: Paul Oliveria| Date: Wed, 13 Apr 2022 16:00:00 +0000

Microsoft took action against the ZLoader trojan by working with telecommunications providers around the world to disrupt key ZLoader infrastructure. In this blog, we detail the various characteristics for identifying ZLoader activity, including its associated tactics, recent campaigns, and affiliated payloads, such as ransomware.

The post Dismantling ZLoader: How malicious ads led to disabled security tools and ransomware appeared first on Microsoft Security Blog.

Read more