Month: May 2017

SecuritySophos

Stai criptando i tuoi documenti? Ecco cosa succede se non lo fai

Credit to Author: Sophos Italia| Date: Fri, 19 May 2017 09:27:30 +0000

Nel giugno del 2015 qualcuno collegato all&#8217;Università di Plymouth inviò accidentalmente un foglio elettronico contenente gli stipendi, le pensioni e le indennità di 245 membri del personale senior all&#8217;indirizzo e-mail errato. L&#8217;errore fu segnalato al Commissario per l&#8217;informazione del Regno Unito (ICO) e fu affermato che il file era stato eliminato dal destinatario. Finché, dunque, [&#8230;]<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=34396&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/Covk7NWhXBw” height=”1″ width=”1″ alt=””/>

Read More
MalwareBytesSecurity

Stealing Windows credentials using Google Chrome

Credit to Author: Pieter Arntz| Date: Tue, 23 May 2017 14:00:26 +0000

This article explains how Chrome users are at risk of spilling their Microsoft Authentication credentials by simply visiting the wrong site.

Categories:

Tags:

(Read more…)

The post Stealing Windows credentials using Google Chrome appeared first on Malwarebytes Labs.

Read More
QuickHealSecurity

PDF files with embedded docm files now deliver Jaff Ransomware

Credit to Author: Threat Research Labs| Date: Tue, 23 May 2017 11:30:45 +0000

Adding to the havoc created by the recent outbreak of the WannaCry Ransomware is a new entry to the list of encrypting ransomware called ‘Jaff’. Reportedly, this variant has been created by the authors of the Locky ransomware. The source of this ransomware is the Necurs botnet which is using…

The post PDF files with embedded docm files now deliver Jaff Ransomware appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read More
ComputerWorldIndependent

4 ways blockchain is the new business collaboration tool

Credit to Author: Lucas Mearian| Date: Tue, 23 May 2017 03:01:00 -0700

While blockchain may have cut its teeth on the cryptocurrency Bitcoin, the distributed electronic ledger technology is quickly making inroads across a variety of industries.

That’s mainly because of its innate security and its potential for improving systems  operations all while reducing costs and creating new revenue streams.

David Schatsky, a managing director at consultancy Deloitte LLP, believes blockchain’s diversity speaks to its versatility in addressing business needs, but “the impact that blockchain will have on businesses in various industries is not yet fully understood.”

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Connecting with work from the road? Here's how to stay safe

Credit to Author: Ryan Francis| Date: Tue, 23 May 2017 03:00:00 -0700

Every company has workaholics who can’t leave their duties behind when heading out on vacation. They’re kind of worker who, if the hotel doesn’t have Wi-Fi, will rush to the closest coffee shop or eatery to stay connected, check email and jump onto a video conference call.

Those are the kinds of insecure wireless networks that make IT security managers nervous. 

And for good reason. Public Wi-Fi networks at cafes and coffee shops are open to, and can be accessed by, anyone, according to mobile security vendor iPass. They require neither security keys and passphrases nor firewall protection. That leaves  employees vulnerable to man-in-the-middle attacks.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

5 ways to stop future global malware attacks

Credit to Author: Preston Gralla| Date: Mon, 22 May 2017 14:06:00 -0700

The global WannaCry ransomware attack, which crippled hospitals, government organizations, companies and individuals around the world, didn’t have to happen. It was no grand technological feat perpetrated by genius hacker masterminds. Instead, it took advantage of the lazy, patchwork way organizations handle security and the seamy roles that the National Security Agency (NSA) and big tech companies play in undermining security in the internet age.

And that, in fact, is a piece of good news. Because it means that stopping the next global malware attack needn’t be impossible. Here are five steps that can do it.

To read this article in full or to leave a comment, please click here

Read More