Booter Boss Interviewed in 2014 Pleads Guilty

Credit to Author: BrianKrebs| Date: Thu, 28 Feb 2019 15:14:05 +0000

A 20-year-old Illinois man has pleaded guilty to running multiple DDoS-for-hire services that launched millions of attacks over several years. The plea deal comes almost exactly five years after KrebsOnSecurity interviewed both the admitted felon and his father and urged the latter to take a more active interest in his son’s online activities.

Read more

Protecting against the next wave of advanced threats targeting Office 365 – Trend Micro Cloud App Security 2018 detection results and customer examples

Credit to Author: Joyce Huang| Date: Thu, 28 Feb 2019 16:31:06 +0000

Since the release of “Trend Micro Cloud App Security 2017 Report” about a year ago, threats using email as the delivery vector have grown significantly. Business Email Compromise (BEC) scams have already caused USD $12.5 billion in global losses as of 2018 – a 136.4% increase from the $5.3 billion reported in 2017. The popularity…

The post Protecting against the next wave of advanced threats targeting Office 365 – Trend Micro Cloud App Security 2018 detection results and customer examples appeared first on .

Read more

Key considerations for building vs. buying identity access management solutions

Credit to Author: Kayla Matthews| Date: Thu, 28 Feb 2019 16:00:00 +0000

Having a strong identity and access management solution is critical to the security of your organization. It ensures that the right people have access to your system—and keeps unauthorized users out. Should businesses build these solutions in-house or look to third-party vendors to fill the gap? Here are the factors to consider.

Categories:

Tags:

(Read more…)

The post Key considerations for building vs. buying identity access management solutions appeared first on Malwarebytes Labs.

Read more

Insecure VPNs: Top risks and symptoms that stronger security is needed

Credit to Author: Trend Micro| Date: Thu, 28 Feb 2019 15:00:21 +0000

Virtual private networks, or VPNs, were created to provide a secure tunnel in which user activity can be carried out in privacy. In this way, VPNs have been utilized by individual users, as well as to support business processes for several years, and their use is only growing. According to current statistics, nearly 25 percent…

The post Insecure VPNs: Top risks and symptoms that stronger security is needed appeared first on .

Read more

Now you can buy police-grade iPhone hacking tools on eBay

Credit to Author: Jonny Evans| Date: Thu, 28 Feb 2019 06:25:00 -0800

If you want to hack your way into an old iPhone you can get hold of a law enforcement-grade system to do just that for a bargain price on eBay.

I think that’s a crime

I can’t stress this enough.

The very existence of tools like these is a threat to every smartphone user. This is because no matter how many times people argue that these solutions will only see use by law enforcement, these things always proliferate.

The fact that Celebrate systems law enforcement was until recently spending heavily on acquiring are now available on the open market for as little as $100 is a perfect illustration of this.

To read this article in full, please click here

Read more

Crypto Mining Service Coinhive to Call it Quits

Credit to Author: BrianKrebs| Date: Wed, 27 Feb 2019 23:19:28 +0000

Roughly one year ago, KrebsOnSecurity published a lengthy investigation into the individuals behind Coinhive[.]com, a cryptocurrency mining service that has been heavily abused to force hacked Web sites to mine virtual currency. On Tuesday, Coinhive announced plans to pull the plug on the project early next month.

Read more