Twitter bug attack: All you need to know & ways to fight such attacks

Credit to Author: Ankita Ashesh| Date: Thu, 10 May 2018 10:53:16 +0000

One company with a turnover of $2.44bn 330 million users 500 million tweets per day What does it take to bring an upheaval in such a magnanimous company? A bug and . . . . well, that’s all it needs! Twitter Inc. reported a bug encounter a few weeks ago….

Read more

5 cybersecurity questions retailers must ask to protect their businesses

Credit to Author: Jovi Umawing| Date: Tue, 17 Apr 2018 15:00:00 +0000

If retailers think they already have much to worry about, they have another thing coming— cybersecurity—and it’s no longer something they can keep on the back burner. This piece helps retailers ask the right cybersecurity questions to protect their businesses.

Categories:

Tags:

(Read more…)

The post 5 cybersecurity questions retailers must ask to protect their businesses appeared first on Malwarebytes Labs.

Read more

Explained: SQL injection

Credit to Author: Pieter Arntz| Date: Fri, 02 Mar 2018 18:30:40 +0000

SQL injection is one of the most common attacks against businesses, with a high rate of success. So what can you do to prevent them?

Categories:

Tags:

(Read more…)

The post Explained: SQL injection appeared first on Malwarebytes Labs.

Read more

Singapore government gets into the network defense game

Credit to Author: William Tsing| Date: Tue, 23 Jan 2018 22:00:00 +0000

Governments have been classically slow to adapt to digital realities. Singapore tries to break the mold with a new cybersecurity bill that tackles breaches, infrastructure, and reporting.

Categories:

Tags:

(Read more…)

The post Singapore government gets into the network defense game appeared first on Malwarebytes Labs.

Read more

Labs report: summer ushers in unprecedented season of breaches

Credit to Author: Malwarebytes Labs| Date: Thu, 12 Oct 2017 16:00:27 +0000

In this edition of the Malwarebytes Cybercrime Tactics and Techniques report, we saw a number of high profile breaches targeting the personal information of hundreds of millions of people. We also observed shifts in malware distribution, the revival of some old families, and found cases of international tech support scams.

Categories:

Tags:

(Read more…)

The post Labs report: summer ushers in unprecedented season of breaches appeared first on Malwarebytes Labs.

Read more

Deloitte breached by hackers for months

Credit to Author: William Tsing| Date: Thu, 28 Sep 2017 16:00:58 +0000

On September 25, 2017, Deloitte announced that they detected a breach of the firm’s global email server via a poorly secured admin email in March of this year. We go over the breach and provide suggestions for Deloitte’s cybersecurity clients.

Categories:

Tags:

(Read more…)

The post Deloitte breached by hackers for months appeared first on Malwarebytes Labs.

Read more

Equifax aftermath: How to protect against identity theft

Credit to Author: Malwarebytes Labs| Date: Thu, 14 Sep 2017 15:00:39 +0000

If you are one of the victims of the Equifax breach, you have a heightened risk of becoming a victim of identity theft. And even if you’re not, you should take these precautions.

Categories:

Tags:

(Read more…)

The post Equifax aftermath: How to protect against identity theft appeared first on Malwarebytes Labs.

Read more

Remediation vs. prevention: How to place your bets

Credit to Author: Sarah Enderby| Date: Wed, 13 Sep 2017 15:00:34 +0000

Building a security environment for businesses is a gamble these days. It’s remediation vs. prevention. Which should you bet on?

Categories:

Tags:

(Read more…)

The post Remediation vs. prevention: How to place your bets appeared first on Malwarebytes Labs.

Read more