Author: admin

MalwareBytesSecurity

HermeticWiper: A detailed analysis of the destructive malware that targeted Ukraine

Credit to Author: Threat Intelligence Team| Date: Fri, 04 Mar 2022 17:18:26 +0000

Hours before the invasion of Ukraine by Russian forces, a new piece of malware was launched at Ukrainian targets. In this blog post, we take apart its components and highlight its capabilities.

The post HermeticWiper: A detailed analysis of the destructive malware that targeted Ukraine appeared first on Malwarebytes Labs.

Read More
ComputerWorldIndependent

Employee monitoring risks ‘spiraling out of control,’ union group warns

Credit to Author: Matthew Finnegan| Date: Fri, 04 Mar 2022 04:40:00 -0800

Read More
ComputerWorldIndependent

After Russia’s invasion of Ukraine, it's time to hunker down

Credit to Author: Steven J. Vaughan-Nichols| Date: Thu, 03 Mar 2022 10:46:00 -0800

Read More
ComputerWorldIndependent

It's time to secure the Apple enterprise

Credit to Author: Jonny Evans| Date: Thu, 03 Mar 2022 09:35:00 -0800

It’s not unreasonable to assume that war in Ukraine will generate a wave of cyberattacks. That means every business or personal computer user should audit their existing security protections, particularly for companies that have embraced the hybrid workplace.

While larger enterprises usually employ Chief Information Security Officers (CISOs) and security consultants to manage such tasks, what follows is useful advice for Mac, iPad, and iPhone users seeking to start such an audit.  

To read this article in full, please click here

Read More