Spectre, Google, and the Universal Read Gadget

Credit to Author: Christopher Boyd| Date: Fri, 01 Mar 2019 16:43:37 +0000

A recently released paper by Google has resurrected the spirit of Spectre, a seemingly never-ending threat to most makes of processor. We take a look at what this means, and what the Universal Read Gadget means for most technology users.

Categories:

Tags:

(Read more…)

The post Spectre, Google, and the Universal Read Gadget appeared first on Malwarebytes Labs.

Read more

Hacker destroys VFEmail service, wipes backups

Credit to Author: Christopher Boyd| Date: Thu, 14 Feb 2019 16:56:00 +0000

A hacker managed to compromise, and entirely destroy, a popular email service and all of its backups. What happened?

Categories:

Tags:

(Read more…)

The post Hacker destroys VFEmail service, wipes backups appeared first on Malwarebytes Labs.

Read more

Throwback Thursday: Pick a card, any card …

Credit to Author: Sharky| Date: Thu, 07 Feb 2019 03:00:00 -0800

This conglomerate is structured as several smaller companies, with a big central IT organization plus individual IT groups in some of the companies, reports an IT pilot fish there.

“An IT staffer from one of the companies loaded a password cracker and proceeded to crack the Windows NT servers,” fish says. “He sent out emails bragging about how insecure NT was and giving the NT team a hard time.”

Fish isn’t on the NT team, but he and his security co-workers decide to strike back on behalf of their colleagues — and they do it through the central IT audit group, to make sure it’s all above board.

First, they supply the audit people with a list of more than 100 Unix servers, and get them to pick a server at random. Amazingly, the audit group picks the only server on the list that belongs to the company where the NT attack originated.

To read this article in full, please click here

Read more

Collection 1 data breach: what you need to know

Credit to Author: Malwarebytes Labs| Date: Fri, 18 Jan 2019 18:33:40 +0000

In what’s being dubbed one of the largest data dumps in history, Collection 1 contains the data of over 770 million people. But is it really as bad as it sounds? We take a closer look and let users know what to do if their info is caught up in the mix.

Categories:

Tags:

(Read more…)

The post Collection 1 data breach: what you need to know appeared first on Malwarebytes Labs.

Read more

Ways to Improve Your Data Center Cybersecurity That Most People Don’t Think of Until It’s Too Late

Credit to Author: Steven Carlini| Date: Wed, 16 Jan 2019 16:00:00 +0000

It’s been well publicized that Microsoft fends off more than 7 trillion cyberthreats per day, and allocates over $1 billion each year to cybersecurity for its cloud data centers. While… Read more »

The post Ways to Improve Your Data Center Cybersecurity That Most People Don’t Think of Until It’s Too Late appeared first on Schneider Electric Blog.

Read more

The Advanced Persistent Threat files: APT10

Credit to Author: William Tsing| Date: Wed, 16 Jan 2019 17:00:00 +0000

While security companies are getting good at analyzing the tactics of nation-state threat actors, they still struggle with placing these actions in context and making solid risk assessments. So in this series, we’re going to take a look at a few APT groups, and see how they fit into the larger threat landscape—starting with APT10.

Categories:

Tags:

(Read more…)

The post The Advanced Persistent Threat files: APT10 appeared first on Malwarebytes Labs.

Read more

Luas data ransom: the hacker who cried wolf?

Credit to Author: Christopher Boyd| Date: Fri, 11 Jan 2019 18:00:00 +0000

Irish tram firm Luas were recently compromised and told to pay 1 Bitcoin, or risk user data being fired into the void. The deadline for paying the ransom has now passed: So what happens next? And is anyone out there really at risk?

Categories:

Tags:

(Read more…)

The post Luas data ransom: the hacker who cried wolf? appeared first on Malwarebytes Labs.

Read more

Assessing the security of a portable router: a look inside its hardware, part deux

Credit to Author: Jean Taggart| Date: Wed, 26 Dec 2018 19:15:59 +0000

In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.

Categories:

Tags:

(Read more…)

The post Assessing the security of a portable router: a look inside its hardware, part deux appeared first on Malwarebytes Labs.

Read more

All the reasons why cybercriminals want to hack your phone

Credit to Author: Kayla Matthews| Date: Tue, 18 Dec 2018 16:00:00 +0000

Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn’t they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.

Categories:

Tags:

(Read more…)

The post All the reasons why cybercriminals want to hack your phone appeared first on Malwarebytes Labs.

Read more

Compromising vital infrastructure: transport and logistics

Credit to Author: Pieter Arntz| Date: Tue, 06 Nov 2018 18:05:11 +0000

Transport and logistics are vital infrastructure, because we need them to deliver our daily necessities, but who is responsible for protecting them?

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: transport and logistics appeared first on Malwarebytes Labs.

Read more