Credit to Author: Matthew Phillion| Date: Mon, 05 Feb 2018 20:54:50 +0000
Sophos’ James Lyne talks through the latest threat to our digital wallets on the Nightly Business Report on PBS<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/u5UunF-eOfQ” height=”1″ width=”1″ alt=””/>
Credit to Author: BrianKrebs| Date: Mon, 05 Feb 2018 18:28:30 +0000
Peter Yuryevich Levashov, a 37-year-old Russian computer programmer thought to be one of the world’s most notorious spam kingpins, has been extradited to the United States to face federal hacking and spamming charges. Levashov, who allegedly went by the hacker name “Peter Severa,” or “Peter of the North,” hails from St. Petersburg in northern Russia, but he was arrested last year while in Barcelona, Spain with his family. Authorities have long suspected he is the cybercriminal behind the once powerful spam botnet known as Waledac (a.k.a. “Kelihos”), a now-defunct malware strain responsible for sending more than 1.5 billion spam, phishing and malware attacks each day.
Credit to Author: Trend Micro| Date: Mon, 05 Feb 2018 18:58:13 +0000
Hackers aren’t easing up on business or consumer targets anytime soon. So the best course of action for the industry to take is to apply the lessons learned from these attacks to future protection strategies.
Credit to Author: Malwarebytes Labs| Date: Mon, 05 Feb 2018 18:45:17 +0000
A compilation of notable security news from January 28 to February 4, featuring PUPs, a new Mac malware, two new ransomware variants, robocalls, and more.
Credit to Author: William Tsing| Date: Mon, 05 Feb 2018 17:57:42 +0000
Boomerang Tech solutions had trouble configuring their spambots, thus dropping a few spam bombs on Malwarebytes forums. Watch us catch them red-handed in a scammer call.
Credit to Author: Kim Tremblay| Date: Mon, 05 Feb 2018 13:34:22 +0000
Wall Street is all abuzz about blockchain- especially for banking and financial services. Some consider it a threat while others see it as an opportunity to digitize the industry. Still,… Read more »
Credit to Author: Woody Leonhard| Date: Mon, 05 Feb 2018 09:50:00 -0800
January 2018 was a month that will go down in patching infamy. Looking back on my notes, we had patches released, yanked, re-released and/or re-re-released on 15 different days in January. Untold thousands of machines were bricked by Microsoft patches. Millions of hours were lost chasing down bad patches and bad advice.
Although there were a couple of real bugs fixed in the January patches — the Equation Editor vulnerability being suspect #1 — most of the angst was completely superfluous. The Meltdown/Spectre patches at the heart of the drama attacked a problem that wasn’t — and isn’t — there. We still have no known Meltdown or Spectre exploits in the wild. None.
Credit to Author: Jenny Erie| Date: Mon, 05 Feb 2018 17:00:26 +0000
In the first blog post of this 3-part series, we introduced what rapid cyberattacks are and illustrated how they are different in terms of execution and outcome. Next, we will go into some more details on the Petya (aka NotPetya) attack. How Petya worked The Petya attack chain is well understood, although a few small