The usual suspects

Credit to Author: Sharky| Date: Fri, 13 Dec 2019 03:00:00 -0800

One morning Wilma, the print shop manager at a beer distributor, discovers that her computer has a virus. It’s no big deal — sometimes bad things happen to good computers — so she cleans up the system and gets on with her day.

But a few days later the system is infected again.

Considerably more annoyed this time, she contacts Betty (the company’s sole IT person) to get some assistance and make sure the system is 100% clean. After disinfecting the system, Betty checks the browser history and finds that someone has been making late-night visits to X-rated websites.

The question then becomes, Who is using company resources to watch porn? At most companies, suspicion would immediately fall on the nighttime cleaning crew. But the print shop is located in the warehouse, to which the cleaning crew doesn’t have access.

To read this article in full, please click here

Read more

IoT bills and guidelines: a global response

Credit to Author: Christopher Boyd| Date: Fri, 22 Nov 2019 16:27:47 +0000

IoT laws and guidelines abound, as we take a look what’s happening around the world in the name of securing Internet-connected devices.

Categories:

Tags:

(Read more…)

The post IoT bills and guidelines: a global response appeared first on Malwarebytes Labs.

Read more

A week in security (October 28 – November 3)

Credit to Author: Malwarebytes Labs| Date: Mon, 04 Nov 2019 16:37:57 +0000

A roundup of the latest cybersecurity news for the week of October 28 – November 3, including cyberattacks against SMBs, the Internet’s 50th birthday, stalkerware, donation scams, and more.

Categories:

Tags:

(Read more…)

The post A week in security (October 28 – November 3) appeared first on Malwarebytes Labs.

Read more

As Internet turns 50, more risks and possibilities emerge

Credit to Author: Akshay Bhargava| Date: Tue, 29 Oct 2019 15:00:00 +0000

The world as we know it changed on October 29, 1969, the day the Internet was born. 50 years later, it’s both ubiquitous and full of potential—and risks.

Categories:

Tags:

(Read more…)

The post As Internet turns 50, more risks and possibilities emerge appeared first on Malwarebytes Labs.

Read more

Throwback Thursday: Timing is everything

Credit to Author: Sharky| Date: Thu, 29 Aug 2019 03:00:00 -0700

It’s many years ago, and this pilot fish regularly travels to company offices around the country, dealing with IT-related problems and running user training sessions.

The big current project is implementing internet filtering after complaints that some workers are viewing inappropriate websites. So fish has to head to a meeting with many directors and managers to demonstrate.

Upon arriving at the meeting site, fish sets up a laptop and projector and connects it to the internal network. Then he tests to make sure the filtering is working, calling up a blocked site that, if it does display, only shows a silhouette of a bunny with a bow tie.

But not to worry: The site is blocked, so everything is ready.

To read this article in full, please click here

Read more

Throwback Thursday: Eyes only

Credit to Author: Sharky| Date: Thu, 22 Aug 2019 03:00:00 -0700

Programmer pilot fish goes online to a message board for a development system that’s used for one of his company’s applications.

But he gets a message that the site is blocked. He can either forget about it, click a link to continue, or click a link to see the company’s access policy.

He clicks to continue, gets what he needs, and then, just out of curiosity, he clicks to see the access policy to get an idea of why this site is being blocked.

But instead of seeing the access policy, fish sees this message: Content blocked. Click here to access our internet resource policy.

Sputters baffled fish, “It actually blocked the policy!”

To read this article in full, please click here

Read more