By now, most businesses have ditched paper in favor of digital files, making the most of paperless storage and more efficient workflows. However, file sharing has its downsides: it can be easy to get lost in multiple document versions, while security m…
On Friday, August 21, 2020, we began detecting fake Malwarebytes installation files containing a backdoor that loads a Monero miner based on XMRig onto infected PCs. The most prevalent filename under which one of the installation files is being distrib…
On Friday, August 21, 2020, we began detecting fake Malwarebytes installation files containing a backdoor that loads a Monero miner based on XMRig onto infected PCs. The most prevalent filename under which one of the installation files is being distrib…
Up until now, the home was for family dinners, movie nights, and the occasional online shopping spree. With the current pandemic, this has all changed, and none of us are entirely ready for it. Over the last few weeks especially, households across the …
As the pandemic continues around the world, malware authors have hijacked its importance and use it to their advantage. Covid-19 and its various references have been showing up more frequently in phishing lures, masquerading as phony apps, and in many …
Cybersecurity researchers in Germany published findings this week that mailto links can be abused to covertly steal local files from victims and email them to the attacker. “Mailto” links use a special protocol that opens up a new email “compose” windo…
Back to school season is upon us. And this year, things look a bit different. Families and teachers alike are having to adjust to the reality of online and distanced learning, often facing a steep learning curve in familiarizing themselves with various…
As more online learning is happening thanks to virtual classrooms, the potential for data breaches and malware spread increases. That is because these remote connections and user data collected could be compromised by hackers.
To minimize the risk of your business losing data to hacks and breaches, it’s crucial to ensure that your web server is set up as securely as possible. If your server security is compromised, it could result in anything from spam advert injections on a…
“Fake news” is a term that has taken off in recent years, most infamously during the 2016 US presidential election. Biased news and sensationalism disguised as journalism has been around for a long time, but has been amplified through the internet and …