Porn extortion malware GandCrab is back — and romantic
Credit to Author: Marina Mash| Date: Mon, 04 Mar 2019 13:14:47 +0000
GandCrab still holds 40% of the ransomware market. Recent distribution methods help the malware stand out.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Marina Mash| Date: Mon, 04 Mar 2019 13:14:47 +0000
GandCrab still holds 40% of the ransomware market. Recent distribution methods help the malware stand out.
Read MoreCredit to Author: Malwarebytes Labs| Date: Mon, 04 Mar 2019 18:03:33 +0000
![]() | |
| A roundup of the past week’s news, including mobile threats, viral scares, PDF tracking, and more. Categories: Tags: exploitsGPUmomoPDFtrackingtwitter |
The post A week in security (February 25 – March 3) appeared first on Malwarebytes Labs.
Read More
Credit to Author: Lily Hay Newman| Date: Mon, 04 Mar 2019 11:00:00 +0000
New research from IBM shows that several visitor management systems had a rash of vulnerabilities.
Read MoreCredit to Author: Jon Clay (Global Threat Communications)| Date: Mon, 04 Mar 2019 15:00:20 +0000

Do you ever question the value of the mounds of data we all collect? We make a point to stop, analyze and share, especially because we know you might not have the time. So, I bring you our annual look back at the more interesting security events and trends seen last year. The report, Caught…
The post A Look Back at the 2018 Security Landscape appeared first on .
Read More
Credit to Author: Nicholas Thompson| Date: Sun, 03 Mar 2019 13:00:00 +0000
Will Roper, acquisition executive for the US Air Force, talks to WIRED’s editor-in-chief about making the military more adaptive, the role of AI, and what he worries about every day.
Read More
Credit to Author: Emily Dreyfuss| Date: Sat, 02 Mar 2019 14:00:00 +0000
Plus: cryptocurrency dust problems for #DeleteCoinbase, leaked financial watch lists, and more of the week’s top security news.
Read More
Credit to Author: Brian Barrett| Date: Thu, 28 Feb 2019 20:11:21 +0000
The Hanoi debacle shows that if you want to make progress with North Korea, you have to put in the work.
Read MoreCredit to Author: Nikolay Pankov| Date: Fri, 01 Mar 2019 17:27:16 +0000
Analysis of Sauron’s hacking tools implemented in the devices known as Rings of Power.
Read More