Month: September 2018

SecuritySophos

Nur Vorkasse bitte – Neue WannaCrypt-Ransomware ist aufdringlich

Credit to Author: Jörg Schindler| Date: Tue, 26 Jun 2018 10:24:35 +0000

Gibt es Schlimmeres als einen Ransomware-Angriff, der sämtliche Dateien zerhackt und Geld fordert, damit der Computer wieder befreit wird? WannaCry hat der Ransomware-Gefahr eine ganz neue Dimension verliehen, indem es den Prozess der Datenzerstörung mit einem selbst-verbreitenden Computer-Virus kombinierte. Als Ergebnis konnte WannaCry sich automatisch ins eigene Netzwerk einschleichen und hatte das Potenzial, Hunderte oder [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/QLhkSXxyFmU” height=”1″ width=”1″ alt=””/>

Read More
MicrosoftSecurity

Protecting user identities

Credit to Author: toddvanderark| Date: Tue, 04 Sep 2018 21:20:18 +0000

This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. In this blog, we explain how Microsoft 365 security solutions help you protect your users and their identities.

Read More
IndependentKrebs

For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records

Credit to Author: BrianKrebs| Date: Tue, 04 Sep 2018 17:22:41 +0000

mSpy, the makers of a software-as-a-service product that claims to help more than a million paying customers spy on the mobile devices of their kids and partners, has leaked millions of sensitive records online, including passwords, call logs, text messages, contacts, notes and location data secretly collected from phones running the stealthy spyware. Less than a week ago, security researcher Nitish Shah directed KrebsOnSecurity to an open database on the Web that allowed anyone to query up-to-the-minute mSpy records for both customer transactions at mSpy’s site and for mobile phone data collected by mSpy’s software. The database required no authentication.

Read More