Security

MalwareBytesSecurity

Biotech health care innovations meet security challenges

Credit to Author: Pieter Arntz| Date: Tue, 25 Feb 2020 17:54:06 +0000

Advancements in biotech could save thousands, if not millions of lives. But what security and privacy challenges do they introduce? We take a close look at recent innovations.

Categories:

Tags:

(Read more…)

The post Biotech health care innovations meet security challenges appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Introducing Lock and Code: a Malwarebytes Labs podcast

Credit to Author: Malwarebytes Labs| Date: Tue, 25 Feb 2020 17:27:17 +0000

Malwarebytes is launching a podcast, called Lock and Code, on Monday, March 2, breaking down cybersecurity headlines and diving into complex issues with guest interviews. Tune in every two weeks.

Categories:

Tags:

(Read more…)

The post Introducing Lock and Code: a Malwarebytes Labs podcast appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

Hackers Expand Their Repertoire as Trend Micro Blocks 52 Billion Threats in 2019

Credit to Author: Trend Micro| Date: Tue, 25 Feb 2020 15:56:29 +0000

Variety is welcome in most walks of life, but not when it comes to the threat landscape. Yet that is unfortunately the reality facing modern cybersecurity professionals. As Trend Micro’s 2019  roundup report reveals, hackers have an unprecedented array of tools, techniques and procedures at their disposal today. With 52 billion unique threats detected by…

The post Hackers Expand Their Repertoire as Trend Micro Blocks 52 Billion Threats in 2019 appeared first on .

Read More
SecuritySophos

How I learned to stop worrying and love ‘grey hat’ tools

Credit to Author: Tad Heppner| Date: Tue, 25 Feb 2020 13:45:19 +0000

A comprehensive security solution needs a sense of subtlety: not all machine code lends itself to be classified easily as malicious. As with most things in life, there&#8217;s a grey area in malware detection that includes hacking tools, poorly designed or easily exploitable applications, or borderline adware that provides little benefit to the unfortunate user [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/TR1pieWZO1k” height=”1″ width=”1″ alt=””/>

Read More