cybercrime

SecurityTrendMicro

Extending Public-Private Partnerships with Milipol

Credit to Author: Trend Micro| Date: Tue, 30 Oct 2018 16:04:46 +0000

By: Loïc Guézo At Trend Micro, we’ve been protecting consumers, SMBs, enterprises and government customers from the latest threats for three decades now. This has required us to build a global team of experienced researchers, state-of-the-art R&D labs and much more, to fuel our industry-leading cybersecurity solutions. We also understand that there’s a bigger picture…

The post Extending Public-Private Partnerships with Milipol appeared first on .

Read More
MalwareBytesSecurity

Mobile Menace Monday: top five scariest mobile threats

Credit to Author: Nathan Collier| Date: Mon, 29 Oct 2018 15:00:00 +0000

In the spirit of this upcoming Halloween season, we thought we’d provide you with a list of the top five scariest mobile threats in our book.

Categories:

Tags:

(Read more…)

The post Mobile Menace Monday: top five scariest mobile threats appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Huge breach affects 9 million Cathay Pacific customers

Credit to Author: Christopher Boyd| Date: Thu, 25 Oct 2018 17:57:20 +0000

Airline company Cathay Pacific revealed that a huge breach took place in March 2018, affecting around 9 million customers. We take a look at some of the potential fallout.

Categories:

Tags:

(Read more…)

The post Huge breach affects 9 million Cathay Pacific customers appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Compromising vital infrastructure: how voting machines and elections are vulnerable

Credit to Author: Pieter Arntz| Date: Tue, 23 Oct 2018 12:00:00 +0000

What are our options for secure and honest election results? Should we be using voting machines or are there better alternatives?

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: how voting machines and elections are vulnerable appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Information operations on Twitter: new data released on election tampering

Credit to Author: Christopher Boyd| Date: Thu, 18 Oct 2018 15:00:00 +0000

New information released by Twitter sheds fresh light on the various professional troll campaigns deployed alongside the 2016 presidential elections.

Categories:

Tags:

(Read more…)

The post Information operations on Twitter: new data released on election tampering appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

The BEC List: Helping Thwart Business Email Compromise through Collaboration

Credit to Author: Trend Micro| Date: Thu, 11 Oct 2018 19:30:01 +0000

Today, the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) gave the JD Falk Award to the Business Email Compromise (BEC) List. The BEC List comprises cybersecurity firms, researchers and internet infrastructure companies that help deal with cybercriminal activities and schemes. The JD Falk Award is given to individuals or groups whose meritorious work has…

The post The BEC List: Helping Thwart Business Email Compromise through Collaboration appeared first on .

Read More
MalwareBytesSecurity

Bloomberg blunder highlights supply chain risks

Credit to Author: Adam McNeil| Date: Wed, 10 Oct 2018 16:00:00 +0000

A potentially erroneous report from Bloomberg claimed that Chinese spies were able to infiltrate US hardware supplier Supermicro, and therefore, our technology supply chain. Learn how this unverified story could ultimately come true—and what, if anything, can be done to stop it.

Categories:

Tags:

(Read more…)

The post Bloomberg blunder highlights supply chain risks appeared first on Malwarebytes Labs.

Read More