Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press

Credit to Author: Pieter Arntz| Date: Fri, 01 Nov 2019 20:26:48 +0000

When it comes to cybersecurity, journalists need to protect themselves, their sources, and the freedom of the press. Which methods should they use?

Categories:

Tags:

(Read more…)

The post Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press appeared first on Malwarebytes Labs.

Read more

Everything you need to know about ATM attacks and fraud: part 2

Credit to Author: Jovi Umawing| Date: Fri, 02 Aug 2019 15:00:00 +0000

In part two of this two-part series on ATM attacks and fraud, we outline the final two ATM attack types—logical and social engineering—and provide info on how they are conducted, the different malware families used in these attacks, and how to protect against them.

Categories:

Tags:

(Read more…)

The post Everything you need to know about ATM attacks and fraud: part 2 appeared first on Malwarebytes Labs.

Read more

Your Android’s accelerometer could be used to eavesdrop on your calls

Credit to Author: Danny Bradbury| Date: Tue, 23 Jul 2019 10:13:08 +0000

Researchers have created an attack called Spearphone that uses the motion sensors in Android phones to listen to phone calls, interactions with your voice assistant, and more.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/XizfSFAizIQ” height=”1″ width=”1″ alt=””/>

Read more

Why Enterprises Still Have to Worry about Eavesdropping

Credit to Author: Trend Micro| Date: Fri, 03 Aug 2018 13:00:16 +0000

When one thinks about eavesdropping, a mental image of a shadowy stranger, hiding behind a corner and listening in on others’ conversations may come to mind. With the rise of VoIP calling, however, enterprises became aware of digital eavesdropping that impacted their corporate business calls. Now, though, much of the concern surrounding eavesdropping has been…

The post Why Enterprises Still Have to Worry about Eavesdropping appeared first on .

Read more

What’s the real value—and danger—of smart assistants?

Credit to Author: Pieter Arntz| Date: Wed, 18 Jul 2018 20:24:44 +0000

Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they’re dangerous, and other times downright hilarious. What’s the real value in these devices?

Categories:

Tags:

(Read more…)

The post What’s the real value—and danger—of smart assistants? appeared first on Malwarebytes Labs.

Read more