Explained: like-farming

Credit to Author: Pieter Arntz| Date: Thu, 18 Apr 2019 15:00:00 +0000

Like-farming is a popular method on social media to harvest as many likes and shares as possible in order to increase the value of a site or domain. But what happens when scammers get in the game?

Categories:

Tags:

(Read more…)

The post Explained: like-farming appeared first on Malwarebytes Labs.

Read more

This Week in Security News: Medical Malware and Monitor Hacks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Thu, 18 Apr 2019 13:00:42 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how baby monitors may be susceptible to hacking. Also, learn about a medical flaw that enables hackers to hide malware. Read on: Is Your Baby Monitor…

The post This Week in Security News: Medical Malware and Monitor Hacks appeared first on .

Read more

5 ways to instantly detect a phishing email and save yourself from phishing attack

Credit to Author: Sushmita Kalashikar| Date: Thu, 18 Apr 2019 11:06:17 +0000

Phishing is a fraudulent activity to trick you into revealing your personal and confidential information. This information usually includes bank account details, net banking details, credit/debit card numbers, login ID and passwords. Every day, countless people become unsuspecting victims of phishing attacks. With cyber criminals adopting sophisticated modes of phishing…

Read more

Malware targeting industrial plants: a threat to physical security

Credit to Author: Pieter Arntz| Date: Wed, 17 Apr 2019 16:04:20 +0000

When malware shuts down the computer systems of an industrial plant, it could threaten the physical security of those working in or living near it. Here’s how to protect your workforce and your business from targeted threats.

Categories:

Tags:

(Read more…)

The post Malware targeting industrial plants: a threat to physical security appeared first on Malwarebytes Labs.

Read more

What Did We Learn from the Global GPS Collapse?

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Wed, 17 Apr 2019 13:00:24 +0000

On April 6, 2019, a ten-bit counter rolled over. The counter, a component of many older satellites, marks the weeks since Jan 1, 1980. It rolled over once before, in the fall of 1999. That event was inconsequential because few complex systems relied on GPS. Now, more systems rely on accurate time and position data:…

The post What Did We Learn from the Global GPS Collapse? appeared first on .

Read more

Is Your Baby Monitor Susceptible to Hacking?

Credit to Author: Trend Micro| Date: Wed, 17 Apr 2019 12:00:19 +0000

There’s no doubt that digital technology, in many of its forms, brings everyday tasks much closer-to-hand. From discovering breaking news, to online shopping, to keeping tabs on your home via security cameras—everything is within the touch of a button. Even so, with the growing reach of the Internet of Things (IoT), new and unsuspected threats…

The post Is Your Baby Monitor Susceptible to Hacking? appeared first on .

Read more