Mozilla urges Apple to make privacy a team sport

Credit to Author: David Ruiz| Date: Wed, 01 May 2019 17:39:28 +0000

Mozilla is currently pushing Apple into placing extra barriers between iPhone users and online advertisers. Why? Because, according to Mozilla, it could work, which could benefit users everywhere.

Categories:

Tags:

(Read more…)

The post Mozilla urges Apple to make privacy a team sport appeared first on Malwarebytes Labs.

Read more

Facebook’s history betrays its privacy pivot

Credit to Author: David Ruiz| Date: Wed, 20 Mar 2019 15:00:00 +0000

Facebook’s self-proclaimed pivot to privacy faces a fierce opponent—Facebook’s own history.

Categories:

Tags:

(Read more…)

The post Facebook’s history betrays its privacy pivot appeared first on Malwarebytes Labs.

Read more

Compromising vital infrastructure: communication

Credit to Author: Pieter Arntz| Date: Fri, 08 Feb 2019 19:09:33 +0000

In the series about vital infrastructure we look at communication. How vital is it? How is malware a threat and even how does malware show us the way to secure communication?

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: communication appeared first on Malwarebytes Labs.

Read more

Merging Facebook Messenger, WhatsApp, and Instagram: a technical, reputational hurdle

Credit to Author: davidruiz| Date: Thu, 07 Feb 2019 16:53:35 +0000

Facebook’s plan to integrate secure messaging across Messenger, WhatsApp, and Instagram will demand technical know-how and a fierce commitment to user privacy.

Categories:

Tags:

(Read more…)

The post Merging Facebook Messenger, WhatsApp, and Instagram: a technical, reputational hurdle appeared first on Malwarebytes Labs.

Read more

Safeguard Encryption “worth checking out” says SC Magazine

Credit to Author: mattcookesophoscom| Date: Wed, 16 Jan 2019 10:32:52 +0000

SC Magazine&#8217;s labs team has taken a look at Sophos Safeguard Encryption. We&#8217;re delighted to say they scored the product a massive 4.75 out of 5! &#8230;adding the extra layer of file security, location-based file encryption and application-based encryption, makes this product worth checking out. You can read the full review here. If you’re looking [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/GWaJe5c_asY” height=”1″ width=”1″ alt=””/>

Read more

Ghost Has Arrived

Credit to Author: Ghanshyam More| Date: Fri, 14 Dec 2018 11:58:50 +0000

On the back of an upswing in Ransomware activity, we decided to carry out an in-depth analysis of Ghost Ransomware. Interesting fact about this malware is that it uses multiple components to encrypt user files. Technical Analysis : Main malware executable (Ghost.exe) is compiled using the DotNet Framework. The infection…

Read more

What Happens When Victims Pay Ransomware Attackers?

Credit to Author: Trend Micro| Date: Mon, 10 Dec 2018 15:00:16 +0000

For many hackers around the globe, ransomware infections have become a lucrative business. Although these types of malware samples have been around for years now, they continue to spur success – and high monetary profits – for attackers. In fact, according to a statement from U.S. Deputy Attorney General Rod Rosenstein during the 2017 Cambridge…

The post What Happens When Victims Pay Ransomware Attackers? appeared first on .

Read more

Marriott breach impacts 500 million customers: here’s what to do about it

Credit to Author: Malwarebytes Labs| Date: Fri, 30 Nov 2018 19:17:33 +0000

Marriott disclosed a large-scale data breach impacting up to 500 million customers who have stayed at a Starwood-branded hotel within the last four years.

Categories:

Tags:

(Read more…)

The post Marriott breach impacts 500 million customers: here’s what to do about it appeared first on Malwarebytes Labs.

Read more

Ransomware Threat Continues: How Infections Take Place

Credit to Author: Trend Micro| Date: Tue, 30 Oct 2018 14:00:20 +0000

If cybersecurity consultants and IT admins have learned anything of the current threat environment, it’s that ransomware will continue to be a pervasive and dangerous threat to individual users, enterprises and organizations at large. When they first emerged, these infections were unlike anything that tech experts had ever seen, combining strong encryption and blackmail tactics…

The post Ransomware Threat Continues: How Infections Take Place appeared first on .

Read more