A week in security (August 12 – 18)

Credit to Author: Malwarebytes Labs| Date: Mon, 19 Aug 2019 17:55:50 +0000

A roundup of the most interesting cybersecurity news stories from August 12 to 18, including a deep dive into facial recognition technology, swatting dangers, social engineering attacks on cities, and more.

Categories:

Tags:

(Read more…)

The post A week in security (August 12 – 18) appeared first on Malwarebytes Labs.

Read more

Installing Windows 7 from a backup? You need a BitLocker patch right away

Credit to Author: Woody Leonhard| Date: Mon, 19 Aug 2019 09:33:00 -0700

No doubt you recall the warning back in February that Windows 7, Server 2008 and Server 2008 R2 patches starting in July would use the SHA-2 encryption protocol. If you want to install Win7 patches issued after July, you have to get the SHA-2 translator installed.

A few days ago, Microsoft tossed a zinger into the FAQs down at the bottom of its SHA-2 post, 2019 SHA-2 Code Signing Support requirement for Windows and WSUS. That post now says that you have to install a seemingly unrelated patch, KB 3133977, entitled, BitLocker can’t encrypt drives because of service crashes in svchost.exe process in Windows 7 or Windows Server 2008 R2.  

To read this article in full, please click here

Read more

How much personalization is too much?

Credit to Author: Seth Rosenblatt| Date: Mon, 19 Aug 2019 15:00:00 +0000

Personalization is the new mantra of marketers—and most people are perfectly okay with that. But when does personalization cross the line into invasive? And what can uncomfortable consumers do about blocking it?

Categories:

Tags:

(Read more…)

The post How much personalization is too much? appeared first on Malwarebytes Labs.

Read more

How Do Threats Align With Detection And Solutions?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Mon, 19 Aug 2019 14:05:16 +0000

There are many different threats targeting many different areas of a corporate network. Have you ever wondered how those threats are stopped? What threats impact which areas of a network? What technology detects and blocks those threats? I wanted to build an interactive graphic to answer those questions. This interactive infographic can help you understand…

The post How Do Threats Align With Detection And Solutions? appeared first on .

Read more

The Rise of “Bulletproof” Residential Networks

Credit to Author: BrianKrebs| Date: Mon, 19 Aug 2019 13:03:32 +0000

Cybercrooks increasingly are anonymizing their malicious traffic by routing it through residential broadband and wireless data connections. Most often, those connections are hacked computers, mobile phones, or home routers. But this is the story of a sprawling “bulletproof residential VPN” service that appears to have been built by acquiring chunks of Internet addresses from some the largest ISPs and mobile data providers in the United States and abroad.

Read more

XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Mon, 19 Aug 2019 13:22:58 +0000

Real enterprises are messy places. One messy reality is that enterprises don’t manage all their endpoints. A smart colleague turned me onto using the % of endpoints and servers managed as a prime security metric. On one end of the spectrum are places like universities that maybe manage 10% of the endpoints on their network….

The post XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR appeared first on .

Read more

Alert! 27 apps found on Google Play Store that prompt you to install Fake Google Play Store

Credit to Author: Vaibhav Billade| Date: Mon, 19 Aug 2019 10:29:14 +0000

Quick Heal Security Lab spotted 27 malicious apps of dropper category on official “Google Play Store”. These apps have been removed from Play Store after Quick Heal Security Lab reported it to Google last week. These apps continuously show installation prompt for fake “Google Play Store”. If any user falls…

Read more

Alert! 27 apps found on Google Play Store that prompt you to install Fake Google Play Store

Credit to Author: Vaibhav Billade| Date: Mon, 19 Aug 2019 10:29:14 +0000

Quick Heal Security Lab spotted 27 malicious apps of dropper category on official “Google Play Store”. These apps have been removed from Play Store after Quick Heal Security Lab reported it to Google last week. These apps continuously show installation prompt for fake “Google Play Store”. If any user falls…

Read more

Os ataques são mais coordenados. Nós também!

Credit to Author: Leonardo Granda| Date: Wed, 12 Dec 2018 12:16:54 +0000

Hoje tive uma conversa muito interessante com um cliente. Falamos sobre a complexidade que vem com a interrupção das ameaças atuais e como os atacantes cibernéticos estão se tornando mais sofisticados quando se trata de perpetrar um ataque. Contei sobre as técnicas que os cibercriminosos estão usando e sobre as tendências de segurança cibernética que [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/1m2v7Ip1tZk” height=”1″ width=”1″ alt=””/>

Read more

Por que México, Chile e agora também Peru?

Credit to Author: Leonardo Granda| Date: Tue, 28 Aug 2018 02:10:30 +0000

Cyberataques na economia global é um fato há muito tempo, esses países estão entre os mais abertos ao comércio internacional, onde realizar transferências para outros países não é nada difícil. E organizações criminosas cibernéticas dedicadas a explorar as fraquezas dos sistemas bancários sabem disso! Seu modus operandi, onde distribuem o dinheiro extraído em diferentes contas [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/vtXL1sfaPxw” height=”1″ width=”1″ alt=””/>

Read more