Do you think like a CISO?
Credit to Author: Anastasiya Gridasova| Date: Thu, 01 Nov 2018 15:24:01 +0000
See how your views on cybersecurity line up with the opinions of CISOs from around the world.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Anastasiya Gridasova| Date: Thu, 01 Nov 2018 15:24:01 +0000
See how your views on cybersecurity line up with the opinions of CISOs from around the world.
Read MoreCredit to Author: Malwarebytes Labs| Date: Thu, 01 Nov 2018 15:00:00 +0000
![]() | |
| Introducing Malwarebytes for Chromebook, the Malwarebytes product that can protect your Chromebook against ransomware, adware, and other modern-day malware. Categories: Tags: ChromebookMalwarebytesMalwareytes for Chromebookprotectionransomwarescan |
The post Introducing Malwarebytes for Chromebook appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Trend Micro| Date: Thu, 01 Nov 2018 13:00:34 +0000

There are numerous different elements and obstacles that contribute to the challenges of data protection in the current threat environment. However, a leading issue is ensuring protection against the latest, emerging attack styles and breach strategies. After all, how can an organization ensure the security of its most critical information and assets if they don’t…
The post Threat Intelligence, the Dark Web and Information sharing: Supporting improved protection appeared first on .
Read MoreCredit to Author: Jeffrey Esposito| Date: Thu, 01 Nov 2018 08:02:46 +0000
In this edition of the Kaspersky Lab podcast, we discuss how one guy’s online video viewing infected a government network, a breach at the Girl Scouts, Wordpress’ bold move, and more.
Read MoreCredit to Author: Pradeep Kulkarni| Date: Thu, 01 Nov 2018 06:17:45 +0000
Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals use different techniques to steal confidential data. Now they are offering…
Read More
Credit to Author: Garrett M. Graff| Date: Wed, 31 Oct 2018 11:00:00 +0000
A series of high-profile cases involving alleged Chinese recruits shows how the country identifies and develops potential spies stateside.
Read MoreCredit to Author: Christopher Boyd| Date: Wed, 31 Oct 2018 17:27:32 +0000
![]() | |
| A data breach from a 2014 Tomorrowland electronic music festival has affected up to 60,000 event-goers caught up in the action. Categories: Tags: breachdata breachhackingmusicmusic festivalpaylogicphishingscamsTomorrowland |
The post Tomorrowland festival goers affected by data breach appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Alexander Moiseev| Date: Wed, 31 Oct 2018 09:30:59 +0000
Blockchain was designed to reliably store data forever. Unfortunately, such design conflicts with modern privacy legislation trends.
Read More