Ways to Improve Your Data Center Cybersecurity That Most People Don’t Think of Until It’s Too Late

Credit to Author: Steven Carlini| Date: Wed, 16 Jan 2019 16:00:00 +0000

It’s been well publicized that Microsoft fends off more than 7 trillion cyberthreats per day, and allocates over $1 billion each year to cybersecurity for its cloud data centers. While… Read more »

The post Ways to Improve Your Data Center Cybersecurity That Most People Don’t Think of Until It’s Too Late appeared first on Schneider Electric Blog.

Read more

The Advanced Persistent Threat files: APT10

Credit to Author: William Tsing| Date: Wed, 16 Jan 2019 17:00:00 +0000

While security companies are getting good at analyzing the tactics of nation-state threat actors, they still struggle with placing these actions in context and making solid risk assessments. So in this series, we’re going to take a look at a few APT groups, and see how they fit into the larger threat landscape—starting with APT10.

Categories:

Tags:

(Read more…)

The post The Advanced Persistent Threat files: APT10 appeared first on Malwarebytes Labs.

Read more

Luas data ransom: the hacker who cried wolf?

Credit to Author: Christopher Boyd| Date: Fri, 11 Jan 2019 18:00:00 +0000

Irish tram firm Luas were recently compromised and told to pay 1 Bitcoin, or risk user data being fired into the void. The deadline for paying the ransom has now passed: So what happens next? And is anyone out there really at risk?

Categories:

Tags:

(Read more…)

The post Luas data ransom: the hacker who cried wolf? appeared first on Malwarebytes Labs.

Read more

Assessing the security of a portable router: a look inside its hardware, part deux

Credit to Author: Jean Taggart| Date: Wed, 26 Dec 2018 19:15:59 +0000

In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.

Categories:

Tags:

(Read more…)

The post Assessing the security of a portable router: a look inside its hardware, part deux appeared first on Malwarebytes Labs.

Read more

All the reasons why cybercriminals want to hack your phone

Credit to Author: Kayla Matthews| Date: Tue, 18 Dec 2018 16:00:00 +0000

Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn’t they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.

Categories:

Tags:

(Read more…)

The post All the reasons why cybercriminals want to hack your phone appeared first on Malwarebytes Labs.

Read more

Compromising vital infrastructure: transport and logistics

Credit to Author: Pieter Arntz| Date: Tue, 06 Nov 2018 18:05:11 +0000

Transport and logistics are vital infrastructure, because we need them to deliver our daily necessities, but who is responsible for protecting them?

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: transport and logistics appeared first on Malwarebytes Labs.

Read more

Tomorrowland festival goers affected by data breach

Credit to Author: Christopher Boyd| Date: Wed, 31 Oct 2018 17:27:32 +0000

A data breach from a 2014 Tomorrowland electronic music festival has affected up to 60,000 event-goers caught up in the action.

Categories:

Tags:

(Read more…)

The post Tomorrowland festival goers affected by data breach appeared first on Malwarebytes Labs.

Read more

Compromising vital infrastructure: how voting machines and elections are vulnerable

Credit to Author: Pieter Arntz| Date: Tue, 23 Oct 2018 12:00:00 +0000

What are our options for secure and honest election results? Should we be using voting machines or are there better alternatives?

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: how voting machines and elections are vulnerable appeared first on Malwarebytes Labs.

Read more

Bloomberg blunder highlights supply chain risks

Credit to Author: Adam McNeil| Date: Wed, 10 Oct 2018 16:00:00 +0000

A potentially erroneous report from Bloomberg claimed that Chinese spies were able to infiltrate US hardware supplier Supermicro, and therefore, our technology supply chain. Learn how this unverified story could ultimately come true—and what, if anything, can be done to stop it.

Categories:

Tags:

(Read more…)

The post Bloomberg blunder highlights supply chain risks appeared first on Malwarebytes Labs.

Read more

LoJack for computers used to attack European government bodies

Credit to Author: Malwarebytes Labs| Date: Thu, 04 Oct 2018 15:00:00 +0000

Security researchers have detected the first known instance of a UEFI bootkit being used against government bodies in Central and Eastern Europe. The attack relies on a persistence mechanism stolen from a legitimate software called Computrace—essentially LoJack for computers—that comes by default on many machines.

Categories:

Tags:

(Read more…)

The post LoJack for computers used to attack European government bodies appeared first on Malwarebytes Labs.

Read more