Month: June 2017

MalwareBytesSecurity

Fireball Chinese malware and you

Credit to Author: Malwarebytes Labs| Date: Wed, 07 Jun 2017 22:54:11 +0000

By now, you might have heard about an adware infection operation that has allegedly spread to 250 million systems called Fireball. The threat intelligence and research teams at Check Point wrote a blog post last week describing the operation, what the threat does the system and the alarming potential the malware has for doing some serious damage. We delve into the worst case scenario with this situation and how to remove Fireball if you are infected.

Categories:

Tags:

(Read more…)

The post Fireball Chinese malware and you appeared first on Malwarebytes Labs.

Read More
ScadaICSSchneider

Takeaways of a Data Center Guy After Cloud Computing Wins the Preakness

Credit to Author: Steven Carlini| Date: Wed, 07 Jun 2017 19:21:50 +0000

Cloud computing, it seems, is cropping up everywhere – even in a 142-year-old horse race. Yes, in case you didn’t catch it, a horse named Cloud Computing won the 142nd… Read more »

The post Takeaways of a Data Center Guy After Cloud Computing Wins the Preakness appeared first on Schneider Electric Blog.

Read More
SecurityTrendMicro

Bridging the Skills Gap with Trend Micro’s Capture the Flag (CTF) Competition

Credit to Author: Jon Clay| Date: Mon, 05 Jun 2017 12:00:50 +0000

We all know the IT security industry is suffering from chronic skills gaps and shortages around the world. In the US things are no different, with an estimated talent shortfall of around 40,000 jobs for information security analyst roles alone. While various initiatives have been proposed, few have managed to make a dent on the…

Read More
MalwareBytesSecurity

Tech support scams: what are other people doing?

Credit to Author: William Tsing| Date: Wed, 07 Jun 2017 14:00:38 +0000

We’ve talked a lot about tech support scams over the past few years, typically focused on what we see ourselves, and the scammers who like to pose as Malwarebytes. But tech support scams are much bigger than that, targeting every tech company under the sun. So what are other people doing about it? Let’s take a look at some of the other players working to keep you safe.

Categories:

Tags:

(Read more…)

The post Tech support scams: what are other people doing? appeared first on Malwarebytes Labs.

Read More
FortinetSecurity

Threat Insights: The Future of Smart and Automated Threats

Credit to Author: John Welton| Date: Wed, 07 Jun 2017 14:15:04 +0000

Threat report data is only as useful as the analysis and context that goes along with it. We asked Derek Manky, global security strategist with our FortiGuard Labs team, to share his thoughts on what some of the data in our recent Threat Landscape Report means going forward. What at a high level did you find interesting in the report? What did the data tell you from your global point of view? A few things stood out to me based on my years of working with the FortiGuard Labs team. At a high level, visibility and control over today’s…

Read More