Security

QuickHealSecurity

GandCrab Riding Emotet’s Bus!

Credit to Author: Bajrang Mane| Date: Fri, 15 Feb 2019 10:03:57 +0000

Emotet Known for constantly changing its payload and infection vectors like spam mail, Malicious Doc and even Malicious JS files. It compromised a very high number of websites on the internet. Emotet malware campaign has existed since 2014. It comes frequently in intervals with different techniques and variants to deliver malware…

Read More
SecurityTrendMicro

Don’t Blame Employees who fall for a BEC scam!

Credit to Author: Chris Taylor| Date: Thu, 14 Feb 2019 17:00:55 +0000

The BBC reports that a media company based in Scotland is now suing a former employee who fell for a Business Email Compromise (BEC) scam. In the scam, the employee received emails which appeared to be from the managing director and requested wire transfers. The employee worked with her line manager on the first payment…

The post Don’t Blame Employees who fall for a BEC scam! appeared first on .

Read More
MalwareBytesSecurity

Should you delete yourself from social media?

Credit to Author: Jean Taggart| Date: Thu, 14 Feb 2019 17:30:00 +0000

All the recent news—from Facebook’s Cambridge Analytica snafu to various abuses of Twitter vulnerabilities—has you wondering: Should I delete myself from social media? We provide advice and links on how to tighten security if you want to cool down, or, if you’re ready to go nuclear, delete yourself permanently.

Categories:

Tags:

(Read more…)

The post Should you delete yourself from social media? appeared first on Malwarebytes Labs.

Read More
MicrosoftSecurity

Step 5. Set up mobile device management: top 10 actions to secure your environment

Credit to Author: Debbie Seres| Date: Thu, 14 Feb 2019 17:00:35 +0000

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 5. Set up mobile device management, youll learn how to plan your Microsoft Intune deployment and set up Mobile Device Management (MDM) as part of your Unified Endpoint Management (UEM) strategy.

The post Step 5. Set up mobile device management: top 10 actions to secure your environment appeared first on Microsoft Secure.

Read More