article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Attackers often use botnets to send out spam or phishing campaigns to carry out distributed denial of service (DDoS) attacks. While this case study is just a snapshot, vigilance in the app store is required. Phishing and Social Engineering. How to Defend Against Phishing. Examples of Phishing Malware Attacks.

Phishing 105
article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

Paterson: What's interesting is one of those technologies is built around common libraries, but then the implementation is different so there's a bunch of companies doing it, kind of their own spin on it but they're largely leveraging one or two common libraries. And then there's some more boutique ones.