Arm your users with knowledge to spot phishing attacks – for free!

Credit to Author: Chris Taylor| Date: Tue, 17 Apr 2018 11:05:50 +0000

Attendees to the Black Hat 2017 security conference said their #1 security concern and most time-consuming activity was phishing and social engineering attacks. That’s no surprise with the increase in Business Email Compromise (BEC) attacks and with most ransomware being delivered by email. But Black Hat Attendees also said the weakest link in their security…

The post Arm your users with knowledge to spot phishing attacks – for free! appeared first on .

Read more

Maybe you shouldn’t use LinkedIn

Credit to Author: William Tsing| Date: Thu, 05 Apr 2018 12:00:00 +0000

In light of Facebook’s Cambridge Analytica problem, we examined another important social networking platform’s protection of users’ data. The results for LinkedIn users? Not pretty.

Categories:

Tags:

(Read more…)

The post Maybe you shouldn’t use LinkedIn appeared first on Malwarebytes Labs.

Read more

Can you spot a phishing email? Take this test and find out!

Credit to Author: Rajiv Singha| Date: Thu, 05 Apr 2018 09:30:20 +0000

One of the oldest, nastiest and most lucrative tools used by hackers is phishing – a method to fool you into revealing your personal and sensitive information such as debit/card numbers, passwords, ATM pin, date of birth – any data that can personal identify you. Here’s an example of a…

Read more

A week in security (March 19 – March 25)

Credit to Author: Malwarebytes Labs| Date: Mon, 26 Mar 2018 17:00:07 +0000

A roundup of notable security news from March 19 to 25, including data theft, ransomware, phone addiction, and more.

Categories:

Tags:

(Read more…)

The post A week in security (March 19 – March 25) appeared first on Malwarebytes Labs.

Read more

An in-depth analysis of a new, emerging “.url” malware campaign – by Quick Heal Security Labs

Credit to Author: Pradeep Kulkarni| Date: Mon, 19 Mar 2018 14:19:13 +0000

Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this ‘.url’ vector and elaborate on the Quant Loader malware which is actively making use of it. Let’s…

Read more

An in-depth analysis of a new, emerging “.url” malware campaign – An analysis by Quick Heal Security Labs

Credit to Author: Pradeep Kulkarni| Date: Mon, 19 Mar 2018 14:19:13 +0000

Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this ‘.url’ vector and elaborate on the Quant Loader malware which is actively making use of it. Let’s…

Read more

The A-Z dictionary of cybersecurity terms

Credit to Author: Rajib Singha| Date: Thu, 15 Mar 2018 11:30:50 +0000

Whether you are a normal user or a tech-guru, being aware of the computer security threats will help fortify your defense against them. So, here’s a handy A-Z dictionary of cybersecurity terms. Index A | B | C | D | E | F | I | K | L…

Read more

A free guide to 7 computer viruses you should know about

Credit to Author: Rajib Singha| Date: Tue, 13 Mar 2018 08:23:09 +0000

Computer viruses are nasty little programs that are designed to lay waste to your computer. Some destroy files stored on your PC, while some trigger different software to malfunction. More nefarious viruses steal your confidential information and some even go to an extent to rig a system’s power load and…

Read more