Conversation hijacking attacks | Salted Hash Ep 38
Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.
RSS Reader for Computer Security Articles
Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.
Credit to Author: Trend Micro| Date: Fri, 27 Jul 2018 15:30:02 +0000
In 2017, more than 700 million malware specimens were discovered. In this type of environment, it can be a considerable challenge for enterprises to keep up with the ever-changing threat landscape and ensure their internal protections are sufficient for safeguarding their most critical IT assets and data. After all, with each new day comes a sophisticated…
The post Which specific malware trends should American businesses be prepared for? appeared first on .
Read MoreCredit to Author: Christopher Boyd| Date: Wed, 25 Jul 2018 15:40:47 +0000
![]() | |
We take a fresh look at Trojans: the history of the term, the most popular threats over the years, the different types of Trojans, and their relationship with social engineering. Categories: Tags: botnetddosdownloadermalwareMobileratTrojansvirus |
The post Trojans: What’s the real deal? appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Aniruddha Dolas| Date: Wed, 25 Jul 2018 13:40:33 +0000
Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques and variants to deliver malware on a victim. Attackers are smart and they use complex techniques to avoid detection. At the start of 2017, we had seen the emotet campaign spreading through…
Read MoreCredit to Author: Malwarebytes Labs| Date: Mon, 23 Jul 2018 17:30:01 +0000
![]() | |
A round up of the security news from July 16 – July 22, including the release of our quarterly Cybercrime tactics and techniques report, breaches, airport security, bug bounties, and more. Categories: Tags: becbountybreachdatamalwareransomware |
The post A week in security (July 16 – July 22) appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Jagadeesh Chandraiah| Date: Mon, 23 Jul 2018 07:00:26 +0000
A malicious, counterfeit version of a VPN client for mobile devices targets security-minded victims with a RAT.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/CepPz89IThs” height=”1″ width=”1″ alt=””/>
Read MoreCredit to Author: Anant Pulgam| Date: Thu, 19 Jul 2018 07:40:40 +0000
How often do you store your important data in files? It’s very common, right? This data may be URLs, topics, personal data like contacts, email-ids, usernames of different portals and sometimes passwords too (though always recommended to not to do so). We very casually copy this data and paste it…
Read MoreCredit to Author: Rupali Parate| Date: Fri, 13 Jul 2018 10:14:16 +0000
When Patanjali’s Kimbho app came to Google Play Store, it made some headlines on the Internet, newspapers, TVs, etc. It had 1.5 lakh downloads in just 3 hours. Kimbho app was designed for socializing, messaging and sharing videos, images, etc., same as what the WhatsApp and Facebook app do. However,…
Read More