Are our police forces equipped to deal with modern cybercrimes?

Credit to Author: Pieter Arntz| Date: Wed, 04 Mar 2020 18:21:02 +0000

Police forces are working hard to keep up with the latest developments in cybercrime, training digital experts for the purpose. But is it enough? And is it happening across the globe?

Categories:

Tags:

(Read more…)

The post Are our police forces equipped to deal with modern cybercrimes? appeared first on Malwarebytes Labs.

Read more

Introducing Lock and Code: a Malwarebytes Labs podcast

Credit to Author: Malwarebytes Labs| Date: Tue, 25 Feb 2020 17:27:17 +0000

Malwarebytes is launching a podcast, called Lock and Code, on Monday, March 2, breaking down cybersecurity headlines and diving into complex issues with guest interviews. Tune in every two weeks.

Categories:

Tags:

(Read more…)

The post Introducing Lock and Code: a Malwarebytes Labs podcast appeared first on Malwarebytes Labs.

Read more

Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack

Credit to Author: Sam Chester| Date: Fri, 14 Feb 2020 17:32:10 +0000

We take a look at some of the most famous (or infamous) hacking scenes from TV and movies and the cybersecurity lessons, if any, we can learn from them.

Categories:

Tags:

(Read more…)

The post Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack appeared first on Malwarebytes Labs.

Read more

INTERPOL Collaboration Reduces Cryptojacking by 78%

Credit to Author: Trend Micro| Date: Wed, 08 Jan 2020 14:40:55 +0000

Cybercriminals are often seen as having the upper hand over the “white hat” community. After all, they’re anonymous, can launch attacks from virtually anywhere in the world, and usually have the element of surprise. But there’s one secret weapon the good guys have: Collaboration. That’s why Trend Micro has always prioritized its partnerships with law…

The post INTERPOL Collaboration Reduces Cryptojacking by 78% appeared first on .

Read more

Would ‘Medicare for All’ help secure health data?

Credit to Author: Adam Kujawa| Date: Tue, 26 Nov 2019 20:30:10 +0000

Beyond the usual arguments on this subject, we wanted to ask the question: Are there any security risks we need to be worried about if the United States were to switch to ‘Healthcare for All’ policies?

Categories:

Tags:

(Read more…)

The post Would ‘Medicare for All’ help secure health data? appeared first on Malwarebytes Labs.

Read more

Sextortion scammers getting creative

Credit to Author: William Tsing| Date: Tue, 26 Nov 2019 17:09:34 +0000

We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of…

Categories:

Tags:

(Read more…)

The post Sextortion scammers getting creative appeared first on Malwarebytes Labs.

Read more

3 Ways for MSPs to Increase Their Managed Security Footprint

Credit to Author: Trend Micro| Date: Fri, 25 Oct 2019 18:05:35 +0000

Managed service providers looking to increase their business often face the choice of whether to focus on finding new customers or expanding their existing base. But there’s a growing opportunity making the latter option especially appealing. The small and midsize businesses that comprise the bulk of the MSP customer base have a limited understanding of…

The post 3 Ways for MSPs to Increase Their Managed Security Footprint appeared first on .

Read more

Are IoT Threats Discussed In The Cybercriminal Underground?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 10 Sep 2019 12:29:09 +0000

With IoT devices expected to reach tens of billions in the next few years, is it any wonder that cybercriminals are looking for ways to take advantage of this massive attack surface to generate illicit money? A number of Trend Micro researchers from around the globe decided to look into this and launched a research…

The post Are IoT Threats Discussed In The Cybercriminal Underground? appeared first on .

Read more