Month: July 2018

MalwareBytesSecurity

Introducing: Malwarebytes Browser Extension

Credit to Author: Malwarebytes Labs| Date: Thu, 26 Jul 2018 17:21:22 +0000

Malwarebytes Browser Extensions (BETA) are available in the official web stores for Chrome and Firefox. Read what they can do for you, and try one, if you haven’t already..

Categories:

Tags:

(Read more…)

The post Introducing: Malwarebytes Browser Extension appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

Is chat putting your business at risk?

Credit to Author: Trend Micro| Date: Thu, 26 Jul 2018 15:30:37 +0000

Now that corporate activities are increasingly taking place outside of the office, technology that enables real-time communication and collaboration among office workers and telecommuters is absolutely essential. Elements like file sharing, video conferencing and cloud access have quickly become imperative. However, few solutions address the challenges that can come up with geographically dispersed workers like…

The post Is chat putting your business at risk? appeared first on .

Read More
MicrosoftSecurity

Attack inception: Compromised supply chain within a supply chain poses new risks

Credit to Author: Windows Defender ATP| Date: Thu, 26 Jul 2018 13:00:13 +0000

A new software supply chain attack unearthed by Windows Defender Advanced Threat Protection (Windows Defender ATP) emerged as an unusual multi-tier case. Unknown attackers compromised the shared infrastructure in place between the vendor of a PDF editor application and one of its software vendor partners, making the apps legitimate installer the unsuspecting carrier of a

Read more

Read More
SecurityTrendMicro

Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Thu, 26 Jul 2018 12:16:18 +0000

Trend Micro recently conducted a global survey of IT and security decision makers. When asked about the top consequence to IoT security, many would have expected it to be data loss. However, the top consequence named with 52% of respondents was “Loss of Customer Trust.” IoT has a physical component that is unusual in the…

The post Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence appeared first on .

Read More
ComputerWorldIndependent

Android security: Analysis, advice, and next-level knowledge

Credit to Author: JR Raphael| Date: Thu, 26 Jul 2018 03:00:00 -0700

It’s tough to talk about Android security without venturing into sensational terrain.

A large part of that is due to the simple fact that the forces driving most Android security coverage are companies that make their money by selling Android security software — and thus companies with strong interests in pushing the narrative that every Android phone is on the perpetual brink of grave, unfathomable danger. Plus, let’s face it: A headline about 70 gazillion Android phones being vulnerable to the MegaMonsterSkullCrusher Virus is far more enticing than one explaining the nuanced realities of Android security.

In actuality, though, Android security is a complex beast — one with multiple layers in place to protect you and one that almost never warrants an alarmist attitude. I’ve been covering Android security closely since the platform’s earliest days, and I’ve busted more myths and called out more shameless publicity stunts than I can even count at this point.

To read this article in full, please click here

Read More