Security

SecurityTrendMicro

Zero-Day Coverage Update – Week of July 9, 2018

Credit to Author: Elisa Lippincott (Global Threat Communications)| Date: Fri, 13 Jul 2018 14:10:20 +0000

Earlier this week, I wrote a blog covering a couple of the statistics from the Zero Day Initiative’s (ZDI) first half of 2018. One of the stats that I didn’t cover is the increasing focus on enterprise applications. The team is seeing consistent growth in submissions of Microsoft and Apple vulnerabilities, but now they’re also…

The post Zero-Day Coverage Update – Week of July 9, 2018 appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Bloomingdale’s and Claudette

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 13 Jul 2018 13:59:11 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Timehop, Macy’s, Bloomingdale’s, and Domain Factory announce a system-wide breach. Also, a new AI tool, Claudette, is holding tech companies accountable for GDPR compliance. Read on to learn…

The post This Week in Security News: Bloomingdale’s and Claudette appeared first on .

Read More
MalwareBytesSecurity

Block all or nothing to prevent ICO fraud?

Credit to Author: Malwarebytes Labs| Date: Thu, 12 Jul 2018 17:00:49 +0000

Unfortunately, most ICOs (Initial Coin Offerings) turn out to be scams. So we feel compelled to ask our customers: would you like us to protect you from aal of them?

Categories:

Tags:

(Read more…)

The post Block all or nothing to prevent ICO fraud? appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained

Credit to Author: Jovi Umawing| Date: Thu, 12 Jul 2018 16:42:06 +0000

Maybe it’s the quirky way some tech writers abbreviate it, or the surreal way it reminded you of that popular Michael Jackson song. Whatever triggers you to remember the term, for most of us, man-in-the-middle embodies something both familiar yet mysterious. Let’s get to know this threat a little bit better, shall we?

Categories:

Tags:

(Read more…)

The post When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained appeared first on Malwarebytes Labs.

Read More