article thumbnail

Scammers, profiteers, and shady sites? It must be tax season

Malwarebytes

Many search hijackers in this family also use notifications, which qualifies them as adware. In 2005 the domain had switched to an outfit selling software to organize and store files. Remember that a social security number, birth date, and a bank account number is all the information a cyber-criminal needs to perform identity theft.

article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

Malware can be categorized based on how it behaves (adware, spyware and ransomware), and how it propagates from one victim to another (viruses, worms and trojans). If you’re lucky, the only malware program you’ve come in contact with is adware, which attempts to expose the compromised end-user to unwanted, potentially malicious advertising.