article thumbnail

Fake ransomware demands payment without actually encrypting files

Malwarebytes

The bogus ransomware extortion attempt even has a name, in the form of “ Phantom Incident Scam ” Even so, this is an area of attack where having a good response strategy for people hoping you’ll fall for a technology based lie is very effective. Stop malicious encryption. Create offsite, offline backups.

article thumbnail

A week in security (April 15 – April 21)

Malwarebytes

Last week on Malwarebytes Labs: Law enforcement reels in phishing-as-a-service whopper Mental health company Cerebral failed to protect sensitive personal data, must pay $7 million Cannabis investment scam JuicyFields ends in 9 arrests Should you share your location with your partner? Giant Tiger breach sees 2.8

Backups 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Logistics giant warns of scams following ransomware attack

Malwarebytes

While companies can use backups to recover from data encryption without paying the ransom, they can’t use them to contain leaks. The post Logistics giant warns of scams following ransomware attack appeared first on Malwarebytes Labs. Malwarebytes blocks RansomExx as Malware.Ransom.Agent.Generic. Stay safe, everyone!

Scams 120
article thumbnail

7 Cyber Safety Tips to Outsmart Scammers

Webroot

Identifying scams Before we dive headfirst into the cyber safety tips, let’s equip ourselves with the ultimate weapon: knowledge. Scams are the digital equivalent of a snake oil salesperson peddling miracle cures. Let’s embrace the golden rule of scam detection: skepticism. Sweepstakes and awards scams Congratulations!

Scams 99
article thumbnail

WhatsApp introduces new security features

Malwarebytes

WhatsApp uses cryptographic keys to ensure that communications across the app are end-to-end encrypted. One of these encryption keys is the authentication key. These purposes include impersonating the victim to send spam, scams, and phishing attempts to other potential victims. Confirm the details and tap Save or Done.

Backups 94
article thumbnail

Taking on the Next Generation of Phishing Scams

Google Security

Posted by Daniel Margolis, Software Engineer, Google Account Security Team Every year, security technologies improve: browsers get better , encryption becomes ubiquitous on the Web , authentication becomes stronger. But phishing persistently remains a threat (as shown by a recent phishing attack on the U.S.

Phishing 107
article thumbnail

Why Freelancers Should Prioritise Cybersecurity

Security Boulevard

Avoid Common Scams and Sketchy Characters Since you are likely a one-person company that doesn’t have an IT team to detect issues and solve problems, you will need to be extra cautious of the companies and clients with which you interact. Part of that is being aware of common scams that could spell big trouble.