Who Owns Your Wireless Service? Crooks Do.

Credit to Author: BrianKrebs| Date: Wed, 07 Aug 2019 22:43:58 +0000

Incessantly annoying and fraudulent robocalls. Corrupt wireless company employees taking hundreds of thousands of dollars in bribes to unlock and hijack mobile phone service. Wireless providers selling real-time customer location data, despite repeated promises to the contrary. A noticeable uptick in SIM-swapping attacks that lead to multi-million dollar cyberheists. If you are somehow under the impression that you — the customer — are in control over the security, privacy and integrity of your mobile phone service, think again. And you’d be forgiven if you assumed the major wireless carriers or federal regulators had their hands firmly on the wheel.

Read more

The lucrative business of Bitcoin sextortion scams

Credit to Author: Threat Intelligence Team| Date: Thu, 22 Aug 2019 15:00:00 +0000

Sextortion scams are back on the radar, and many say they’re on the uptick. We investigate an email campaign to see how lucrative the business of sextortion can be.

Categories:

Tags:

(Read more…)

The post The lucrative business of Bitcoin sextortion scams appeared first on Malwarebytes Labs.

Read more

Helping survivors of domestic abuse: What to do when you find stalkerware

Credit to Author: David Ruiz| Date: Mon, 01 Jul 2019 16:51:59 +0000

Starting today, we’re doing more to protect stalkerware victims than improve our detection capabilities. We’re helping survivors understand how to tell if they’re being watched on their devices—and how to safely get out of the situation.

Categories:

Tags:

(Read more…)

The post Helping survivors of domestic abuse: What to do when you find stalkerware appeared first on Malwarebytes Labs.

Read more