How threat actors are using SMB vulnerabilities

Credit to Author: Pieter Arntz| Date: Fri, 14 Dec 2018 16:00:00 +0000

SMB vulnerabilities have been so successful for criminals that they’ve been used in some of the most devastating ransomware and Trojan attacks of the last two years. Learn how they work and how your organization can protect against them.

Categories:

Tags:

(Read more…)

The post How threat actors are using SMB vulnerabilities appeared first on Malwarebytes Labs.

Read more

Something else is phishy: How to detect phishing attempts on mobile

Credit to Author: Jovi Umawing| Date: Mon, 10 Dec 2018 15:00:56 +0000

Phishing is more problematic on smartphones than on desktops. Not only that, approaches to handling phishing attacks on mobile are quite different because their techniques are also different. So, how can users sniff out a mobile phish? Let us count the ways.

Categories:

Tags:

(Read more…)

The post Something else is phishy: How to detect phishing attempts on mobile appeared first on Malwarebytes Labs.

Read more

Breaches, breaches everywhere, it must be the season

Credit to Author: Malwarebytes Labs| Date: Wed, 05 Dec 2018 19:57:59 +0000

Where are all these major breaches coming from? What should we do if we are a victim? And how can we as a company prevent them?

Categories:

Tags:

(Read more…)

The post Breaches, breaches everywhere, it must be the season appeared first on Malwarebytes Labs.

Read more

Marriott breach impacts 500 million customers: here’s what to do about it

Credit to Author: Malwarebytes Labs| Date: Fri, 30 Nov 2018 19:17:33 +0000

Marriott disclosed a large-scale data breach impacting up to 500 million customers who have stayed at a Starwood-branded hotel within the last four years.

Categories:

Tags:

(Read more…)

The post Marriott breach impacts 500 million customers: here’s what to do about it appeared first on Malwarebytes Labs.

Read more

What DNA testing kit companies are really doing with your data

Credit to Author: Wendy Zamora| Date: Tue, 20 Nov 2018 15:00:00 +0000

Consumer DNA testing kits were a top holiday present last season, and are expected to be big sellers again. But should you think twice before hitting the buy button? What’s really happening with all your genetic data? We take a deep dive into all the areas of concern—plus what the testing companies are getting right—when it comes to the security of your DNA and the privacy of your sensitive personal information.

Categories:

Tags:

(Read more…)

The post What DNA testing kit companies are really doing with your data appeared first on Malwarebytes Labs.

Read more

6 security concerns to consider when automating your business

Credit to Author: Kayla Matthews| Date: Fri, 16 Nov 2018 16:00:00 +0000

When considering an automation strategy, business representatives must be aware of any security risks involved. Here are six automating concerns network admins and other IT staff should keep in mind.

Categories:

Tags:

(Read more…)

The post 6 security concerns to consider when automating your business appeared first on Malwarebytes Labs.

Read more

My precious: security, privacy, and smart jewelry

Credit to Author: Jovi Umawing| Date: Wed, 14 Nov 2018 17:27:23 +0000

Fashionable and functional. These are the makings of smart jewelry. They aren’t secure, yet some are used to secure user data and online accounts. Should you still buy one?

Categories:

Tags:

(Read more…)

The post My precious: security, privacy, and smart jewelry appeared first on Malwarebytes Labs.

Read more

TrickBot takes over as top business threat

Credit to Author: Wendy Zamora| Date: Wed, 14 Nov 2018 15:00:37 +0000

There’s a newer, more sophisticated banking Trojan in town attempting to penetrate business networks and giving Emotet a run for its money. And its name is TrickBot. Learn how this threat is giving organizations a run for their money.

Categories:

Tags:

(Read more…)

The post TrickBot takes over as top business threat appeared first on Malwarebytes Labs.

Read more

How to create a sticky cybersecurity training program

Credit to Author: Jovi Umawing| Date: Thu, 08 Nov 2018 17:00:00 +0000

Organizations know that training employees is not only expensive but time-consuming. But when it comes to cybersecurity, training is a must. Whether you’re an organization of 50 or 50,000, this guide will show you the ropes in creating a cybersecurity training program that works from start to finish.

Categories:

Tags:

(Read more…)

The post How to create a sticky cybersecurity training program appeared first on Malwarebytes Labs.

Read more

Removing the jam in your printer security

Credit to Author: Christopher Boyd| Date: Tue, 30 Oct 2018 16:00:00 +0000

We take a look at printer security, an oft-neglected aspect of locking down an organization’s network.

Categories:

Tags:

(Read more…)

The post Removing the jam in your printer security appeared first on Malwarebytes Labs.

Read more

Sextortion emails: They’re probably not watching you

Credit to Author: William Tsing| Date: Thu, 25 Oct 2018 15:00:00 +0000

Yes, those sextortion email scams using old passwords are still making the rounds. How can you spot a real sextortion attempt from an empty threat? And when should you report to authorities? Read on to find out.

Categories:

Tags:

(Read more…)

The post Sextortion emails: They’re probably not watching you appeared first on Malwarebytes Labs.

Read more