Never Trust a Platform to Put Privacy Ahead of Profit

Credit to Author: Lily Hay Newman| Date: Wed, 09 Oct 2019 18:32:07 +0000
Twitter used phone numbers provided for two-factor authentication to target ads—just like Facebook did before.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Lily Hay Newman| Date: Wed, 09 Oct 2019 18:32:07 +0000
Twitter used phone numbers provided for two-factor authentication to target ads—just like Facebook did before.
Read More
Credit to Author: John Spencer| Date: Wed, 09 Oct 2019 13:00:00 +0000
Opinion: Without proper guidelines, smartphones on the battlefield may kill more soldiers than they save.
Read More
Credit to Author: Lily Hay Newman| Date: Wed, 09 Oct 2019 11:00:00 +0000
The road to routing all Domain Name System lookups through HTTPS is pocked with disagreements over just how much it will help.
Read More
Credit to Author: Paris Martineau| Date: Wed, 09 Oct 2019 00:28:03 +0000
The Internet Research Agency specifically targeted African Americans, and has not stopped trying to influence elections, a Senate intelligence report says.
Read MoreCredit to Author: Todd VanderArk| Date: Wed, 09 Oct 2019 16:00:59 +0000
To plan, implement, and improve an enterprise patch management strategy, Microsoft is partnering with the National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE). Learn how you can also help.
The post Patching as a social responsibility appeared first on Microsoft Security.
Read MoreCredit to Author: Wendy Zamora| Date: Wed, 09 Oct 2019 15:00:00 +0000
![]() | |
| Stalkerware has capabilities as dangerous as nation-state malware, but is often marketed as legitimate. So how do you protect against stalkerware when it’s not always clear it’s a threat? Categories: Tags: domestic abusedomestic violencemonitoringmonitoring applicationsmonitoring appsnational cyber security awareness monthnational cybersecurity awareness monthNCSAMparental monitoring applicationsparental monitoring appsstalkerwaretrackerstracking applicationstracking apps |
The post How to protect against stalkerware, a murky but dangerous mobile threat appeared first on Malwarebytes Labs.
Read MoreCredit to Author: erinj| Date: Wed, 09 Oct 2019 13:45:45 +0000

In just a few short years, Business Email Compromise (BEC) has gone from a peripheral threat to a major cyber risk for organizations. It’s making criminal gangs millions of dollars each month, hitting corporate profits and reputation in the process. Trend Micro has built a formidable array of resources over the past few years to…
The post Tackling the BEC Epidemic in a New Partnership with INTERPOL appeared first on .
Read MoreCredit to Author: Pieter Arntz| Date: Tue, 08 Oct 2019 19:15:46 +0000
![]() | |
| War shipping is a tactic already in use by Red teams, and is a growing opportunity for cybercriminals to compromise business networks. Learn how war shipping works and how to protect your organization from it. Categories: Tags: fluxionkismetraspberry piwar drivingwar shipping |
The post Explained: war shipping appeared first on Malwarebytes Labs.
Read More