Remove 2011 Remove Accountability Remove Cryptocurrency Remove Spyware
article thumbnail

Another NFT explainer, with a bonus look at the data security implications

Webroot

“What Bitcoin was to 2011, NFTs are to 2021.”. Since cryptocurrencies were, are and will continue to be impactful technologies, surely NFTs are a topic worth exploring. NFTs use the same blockchain ledger technology to verify uniqueness that cryptocurrencies rely on to prove ownership.

article thumbnail

Don't plug your phone into a free charging station, warns FBI

Malwarebytes

The term was first used by Brian Krebs in 2011 after a proof of concept was conducted at DEF CON by Wall of Sheep. There are crawlers that can search your phone for personally identifiable information (PII), account credentials, banking-related or credit card data in seconds.

Mobile 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mobile malware evolution 2020

SecureList

The word “covid” in various combinations was typically used in the names of packages hiding spyware and banking Trojans, adware or Trojan droppers. In particular, advertisers can display targeted offerings, and attackers can access accounts with various services, such as online banking. Pandemic theme in mobile threats.

Mobile 132
article thumbnail

Phishers turning hard-working: CERT-GIB records upsurge of phishing resource blockages as duration of attacks grows

Security Affairs

H2 2019 has proved the tendency of past several years: mail remains the main method of delivering ransomware, spyware, backdoors and other malware, being used by cyber crooks in 94 percent of cases. They, in turn, let spyware and backdoors move ahead and become the second most popular malware with a 35-percent share.

article thumbnail

Updates from the MaaS: new threats delivered through NullMixer

Security Affairs

The threat actor abused Bitly shortener and an ad hoc BlogSpot account to protect the malicious code, lastly stored in an encrypted zip archive hosted on Mega.nz. Lower.exe, a sample of “GCleaner” spyware, historically, this piece of malware was initially faking CCleaner to drop additional malware ( link ).

Malware 83
article thumbnail

NullMixer: oodles of Trojans in a single dropper

SecureList

NullMixer is a dropper that includes more than just specific malware families; it drops a wide variety of malicious binaries to infect the machine with, such as backdoors, bankers, downloaders, spyware and many others. To get more information about a user’s Facebook account, Disbuk queries Facebook Graph API. SmokeLoader.

Malware 108