Everything you need to know about ATM attacks and fraud: part 2

Credit to Author: Jovi Umawing| Date: Fri, 02 Aug 2019 15:00:00 +0000

In part two of this two-part series on ATM attacks and fraud, we outline the final two ATM attack types—logical and social engineering—and provide info on how they are conducted, the different malware families used in these attacks, and how to protect against them.

Categories:

Tags:

(Read more…)

The post Everything you need to know about ATM attacks and fraud: part 2 appeared first on Malwarebytes Labs.

Read more

Everything you need to know about ATM attacks and fraud: Part 1

Credit to Author: Jovi Umawing| Date: Wed, 29 May 2019 15:00:00 +0000

If you’re familiar with skimming, you may have also heard of shimming, card trapping, and cash trapping. These are attacks and scams targeted at ATMs. Part 1 of our series explores various ATM attack scenarios and explains what users should look out for when using an ATM.

Categories:

Tags:

(Read more…)

The post Everything you need to know about ATM attacks and fraud: Part 1 appeared first on Malwarebytes Labs.

Read more

What to do when you discover a data breach

Credit to Author: Pieter Arntz| Date: Tue, 07 May 2019 15:00:00 +0000

You’ve discovered that your organization has been breached. Now what? Learn which steps to take in the immediate aftermath to limit the damage and preserve your company’s reputation.

Categories:

Tags:

(Read more…)

The post What to do when you discover a data breach appeared first on Malwarebytes Labs.

Read more

Knowing when it’s worth the risk: riskware explained

Credit to Author: Jovi Umawing| Date: Thu, 23 May 2019 19:22:47 +0000

Riskware is a type of software that, while considered legitimate, can still put users at risk in some way. Learn why anti-malware vendors detect it, and how to tell whether the apps you use are riskware or not.

Categories:

Tags:

(Read more…)

The post Knowing when it’s worth the risk: riskware explained appeared first on Malwarebytes Labs.

Read more

4 Lessons to be learned from the DOE’s DDoS attack

Credit to Author: Kayla Matthews| Date: Fri, 17 May 2019 15:59:32 +0000

The Department of Energy was subject to a DDoS attack that caused major disruptions in their operations. Is the smart grid ready for such an attack? Here are the lessons we can take away from the event.

Categories:

Tags:

(Read more…)

The post 4 Lessons to be learned from the DOE’s DDoS attack appeared first on Malwarebytes Labs.

Read more

How 5G could impact cybersecurity strategy

Credit to Author: Kayla Matthews| Date: Thu, 09 May 2019 16:00:00 +0000

With 5G wireless on the horizon, what will businesses need to do to secure their devices and networks?

Categories:

Tags:

(Read more…)

The post How 5G could impact cybersecurity strategy appeared first on Malwarebytes Labs.

Read more

Vulnerabilities in financial mobile apps put consumers and businesses at risk

Credit to Author: Jovi Umawing| Date: Wed, 08 May 2019 16:30:00 +0000

It’s good to know that your bank’s website boasts that little green padlock, promotes secure communication, and follows a two-factor authentication (2FA) scheme. But are their mobile apps equally secure?

Categories:

Tags:

(Read more…)

The post Vulnerabilities in financial mobile apps put consumers and businesses at risk appeared first on Malwarebytes Labs.

Read more

The top six takeaways for user privacy

Credit to Author: David Ruiz| Date: Wed, 08 May 2019 15:00:00 +0000

Amidst never-ending data breaches and constantly-surprising company fiascos, here are six takeaways for anyone in the US who cares about protecting their online privacy.

Categories:

Tags:

(Read more…)

The post The top six takeaways for user privacy appeared first on Malwarebytes Labs.

Read more

What to do when you discover a data breach?

Credit to Author: Pieter Arntz| Date: Tue, 07 May 2019 15:00:00 +0000

You’ve discovered that your organization has been breached. Now what? Learn which steps to take in the immediate aftermath to limit the damage and preserve your company’s reputation.

Categories:

Tags:

(Read more…)

The post What to do when you discover a data breach? appeared first on Malwarebytes Labs.

Read more

Of hoodies and headphones: a spotlight on risks surrounding audio output devices

Credit to Author: Jovi Umawing| Date: Mon, 22 Apr 2019 18:15:34 +0000

For years, researchers have been poking holes in our audio output devices in the name of security and privacy. They’ve found many ways our headphones can be hacked or otherwise compromised. Learn what they discovered, and how you can secure your own.

Categories:

Tags:

(Read more…)

The post Of hoodies and headphones: a spotlight on risks surrounding audio output devices appeared first on Malwarebytes Labs.

Read more

Explained: like-farming

Credit to Author: Pieter Arntz| Date: Thu, 18 Apr 2019 15:00:00 +0000

Like-farming is a popular method on social media to harvest as many likes and shares as possible in order to increase the value of a site or domain. But what happens when scammers get in the game?

Categories:

Tags:

(Read more…)

The post Explained: like-farming appeared first on Malwarebytes Labs.

Read more