Month: May 2018

MalwareBytesSecurity

Mobile Menace Monday: re-emergence of a fake Android AV

Credit to Author: Nathan Collier| Date: Mon, 07 May 2018 20:46:35 +0000

Way back in early 2013, a new antivirus (AV) company emerged into the mobile security software industry that had everyone perplexed. It seemed like a fake Android AV, but received certification by a reputable AV testing organization! Now, five years later, it’s back. Here’s why you shouldn’t trust it.

Categories:

Tags:

(Read more…)

The post Mobile Menace Monday: re-emergence of a fake Android AV appeared first on Malwarebytes Labs.

Read More
IndependentKrebs

Study: Attack on KrebsOnSecurity Cost IoT Device Owners $323K

Credit to Author: BrianKrebs| Date: Mon, 07 May 2018 16:47:20 +0000

A monster distributed denial-of-service attack (DDoS) against KrebsOnSecurity.com in 2016 knocked this site offline for nearly four days. The attack was executed through a network of hacked “Internet of Things” (IoT) devices such as Internet routers, security cameras and digital video recorders. A new study that tries to measure the direct cost of that one attack for IoT device users whose machines were swept up in the assault found that it may have cost device owners a total of $323,973.75 in excess power and added bandwidth consumption. My bad.

Read More
MalwareBytesSecurity

Week in security (April 30 – May 6)

Credit to Author: Malwarebytes Labs| Date: Mon, 07 May 2018 17:18:15 +0000

A roundup of security news from April 30 – May 6, including Necurs malspam, Spartacus ransomware, Twitter passwords, and cybersecurity studies.

Categories:

Tags:

(Read more…)

The post Week in security (April 30 – May 6) appeared first on Malwarebytes Labs.

Read More
ComputerWorldIndependent

Will blockchain run afoul of GDPR? (Yes and no)

Credit to Author: Lucas Mearian| Date: Mon, 07 May 2018 03:02:00 -0700

As the EU prepares to roll out new data protection regulations this month, concerns are emerging that they could dissuade businesses from rolling out blockchain-based projects because the online transaction technology might innately break the new rules.

The EU’s General Data Protection Regulation (GDPR) targets citizens’ personally identifiable information (PII), providing transparency around its use and giving people the right to restrict its use or request it be deleted all together.

While GDPR never mentions PII, the new rules describing “personal data” are synonymous with it: “Any information that relates to an identified or identifiable living individual. Different pieces of information, which collected together can lead to the identification of a particular person, also constitute personal data.” In short, it means any data that can be tied back to person’s identity.

To read this article in full, please click here

Read More