Month: January 2018

MalwareBytesSecurity

Presenting: Malwarebytes Labs 2017 State of Malware Report

Credit to Author: Malwarebytes Labs| Date: Thu, 25 Jan 2018 13:00:00 +0000

In our 2017 State of Malware report, we examined attack methods, malware developments, and distribution techniques used by cybercriminals over the last 12 months.

Categories:

Tags:

(Read more…)

The post Presenting: Malwarebytes Labs 2017 State of Malware Report appeared first on Malwarebytes Labs.

Read More
ComputerWorldIndependent

WD turns to single app portal to create 'mobile moments' for workers

Credit to Author: Lucas Mearian| Date: Thu, 25 Jan 2018 03:11:00 -0800

Over the past year and a half, storage hardware maker Western Digital (WD) has been in the throes of a massive integration of three companies onto a single application portal.

After acquiring two multi-billion dollar competitors in the past five years – HGST and SanDisk – WD chose to create a new, single application web portal instead of choosing from among the three already in use by each company.

One of the drivers for starting from scratch with a single corporate app portal was to help speed up the integration of future mergers and acquisitions, as well as hardening mobile security. The company also wanted to empower end users by giving them open access to whatever business app they need on any mobile device.

To read this article in full, please click here

Read More
ComputerWorldIndependent

Throwback Thursday: Oops!

Credit to Author: Sharky| Date: Thu, 25 Jan 2018 03:00:00 -0800

This company has just completed its project to build a dedicated secure server room — and it’s really something, reports an IT pilot fish who’s getting the grand-opening tour.

“The construction was led by the building maintenance manager and an IT manager,” fish says. “We were shown the raised floor in case of a flood, and the fireproof and reinforced door with a electronic security key that could keep track of individuals entering the room — and, of course, keep intruders out, as the door had a heavy-duty bolt lock.”

Fish is impressed, right up until the end of the tour. That’s when the door closes as the tour group leaves, and fish turns back for one last look.

To read this article in full, please click here

Read More
QuickHealSecurity

On Data Privacy Day, here are 10 simple tips to keep your data safe

Credit to Author: Rajib Singha| Date: Thu, 25 Jan 2018 11:44:33 +0000

Recognized annually on January 28th, Data Privacy Day is defined as a centered approach towards respecting privacy, safeguarding data, and enabling trust. It is a global effort to raise and promote awareness around protecting one’s data and privacy. With this thought in mind, we have put together these 10 tips…

Read More
IndependentKrebs

Chronicle: A Meteor Aimed At Planet Threat Intel?

Credit to Author: BrianKrebs| Date: Wed, 24 Jan 2018 22:56:52 +0000

Alphabet Inc., the parent company of Google, said today it is in the process of rolling out a new service designed to help companies more quickly make sense of and act on the mountains of threat data produced each day by cybersecurity tools. Countless organizations rely on a hodgepodge of security software, hardware and services to find and detect cybersecurity intrusions before an incursion by malicious software or hackers has the chance to metastasize into a full-blown data breach.

Read More
IndependentSecuriteam

SSD Advisory – Oracle VirtualBox Multiple Guest to Host Escape Vulnerabilities

Credit to Author: SSD / Maor Schwartz| Date: Wed, 24 Jan 2018 14:11:46 +0000

Vulnerabilities summary The following advisory describes two (2) guest to host escape found in Oracle VirtualBox version 5.1.30, and VirtualBox version 5.2-rc1. Credit An independent security researcher, Niklas Baumstark, has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program. Vendor response Oracle were informed of the vulnerabilities and released patches to address them. For … Continue reading SSD Advisory – Oracle VirtualBox Multiple Guest to Host Escape Vulnerabilities

Read More