How to build your own motion-activated security camera

Credit to Author: Jean Taggart| Date: Tue, 16 Oct 2018 15:00:00 +0000

Attention makers! Are you looking for a challenging project that not only gets your gears grinding but helps to keep you secure while traveling? Welcome to the build-your-own security camera tutorial.

Categories:

Tags:

(Read more…)

The post How to build your own motion-activated security camera appeared first on Malwarebytes Labs.

Read more

A week in security (October 8 – 14)

Credit to Author: Malwarebytes Labs| Date: Mon, 15 Oct 2018 15:56:13 +0000

A roundup of the security news from October 8–14 including breaches, phishing attacks, and hacking tools.

Categories:

Tags:

(Read more…)

The post A week in security (October 8 – 14) appeared first on Malwarebytes Labs.

Read more

Malwarebytes Labs Cybercrime Tactics and Techniques Report (CTNT) shows shift to business targets in Q3

Credit to Author: Malwarebytes Labs| Date: Mon, 15 Oct 2018 07:01:00 +0000

The quarterly Malwarebytes Labs Cybercrime Tactics and Techniques Report is here! Learn how Q3 2018 marked a major turning point in cybercrime trends—especially for businesses.

Categories:

Tags:

(Read more…)

The post Malwarebytes Labs Cybercrime Tactics and Techniques Report (CTNT) shows shift to business targets in Q3 appeared first on Malwarebytes Labs.

Read more

Workplace violence: the forgotten insider threat

Credit to Author: Jovi Umawing| Date: Fri, 12 Oct 2018 16:00:00 +0000

Among insider threats, workplace violence could be considered the most dangerous. And yet, the majority of organizations are not prepared. What should they do to protect their employees?

Categories:

Tags:

(Read more…)

The post Workplace violence: the forgotten insider threat appeared first on Malwarebytes Labs.

Read more

Fake browser update seeks to compromise more MikroTik routers

Credit to Author: Malwarebytes Labs| Date: Fri, 12 Oct 2018 15:00:06 +0000

Threat actors are social engineering users with a fake update that, once installed, will scan the Internet in an attempt to exploit vulnerable MikroTik routers.

Categories:

Tags:

(Read more…)

The post Fake browser update seeks to compromise more MikroTik routers appeared first on Malwarebytes Labs.

Read more

6 ways to keep up with cybersecurity without going crazy

Credit to Author: Kayla Matthews| Date: Thu, 11 Oct 2018 15:00:00 +0000

As we dive headfirst into National Cyber Security Awareness Month, it seems only fitting to discuss ways to stay on top of cybersecurity news. But what if following along makes you feel a little overwhelmed? Try these six methods of information-gathering to brush up on your cybersecurity know-how without losing your mind.

Categories:

Tags:

(Read more…)

The post 6 ways to keep up with cybersecurity without going crazy appeared first on Malwarebytes Labs.

Read more

Bloomberg blunder highlights supply chain risks

Credit to Author: Adam McNeil| Date: Wed, 10 Oct 2018 16:00:00 +0000

A potentially erroneous report from Bloomberg claimed that Chinese spies were able to infiltrate US hardware supplier Supermicro, and therefore, our technology supply chain. Learn how this unverified story could ultimately come true—and what, if anything, can be done to stop it.

Categories:

Tags:

(Read more…)

The post Bloomberg blunder highlights supply chain risks appeared first on Malwarebytes Labs.

Read more

When Endpoint Detection and Response (EDR) is not enough

Credit to Author: Simone Spencer| Date: Tue, 09 Oct 2018 15:00:00 +0000

As cybercriminals continue to validate the reality that no security is going to stop every threat every time, companies are turning to endpoint detection and response solutions to close the gap. But is it enough to keep businesses and their data protected?

Categories:

Tags:

(Read more…)

The post When Endpoint Detection and Response (EDR) is not enough appeared first on Malwarebytes Labs.

Read more

A week in security (October 1 – 7)

Credit to Author: Malwarebytes Labs| Date: Mon, 08 Oct 2018 16:31:56 +0000

A roundup of the security news from October 1–7 including National Cybersecurity Awareness Month, LoJack, fileless malware, and BYOS.

Categories:

Tags:

(Read more…)

The post A week in security (October 1 – 7) appeared first on Malwarebytes Labs.

Read more

Fileless malware: part deux

Credit to Author: Vasilios Hioureas| Date: Fri, 05 Oct 2018 15:00:00 +0000

In part two of this series on fileless malware, our malware analyst walks readers through two demonstrations of fileless malware attacks and shows the problems with detecting them using static signatures.

Categories:

Tags:

(Read more…)

The post Fileless malware: part deux appeared first on Malwarebytes Labs.

Read more