Skip to content
Wednesday, January 20, 2021
Latest:
  • Zoom watermarking: pros and cons
  • A Site Published Every Face from Parler’s Capitol Riot Videos
  • The Pace of Digital Acceleration, IT-OT Convergence, and Strong Relationships: The Top Executive Insights
  • Decarbonizing cities – how to harmonize buildings, mobility and infrastructure
  • Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop

Computer Security Articles

RSS Reader for Computer Security Articles

  • Home
    • Fortinet
    • MalwareBytes
    • Sophos
    • TrendMicro
    • Kaspersky
    • QuickHeal
  • Independent
    • Krebs
    • Securiteam
    • ComputerWorld
  • ScadaICS
    • Schneider
  • Security Videos
  • ThreatMap Fortinet

Strontium

MalwareBytes Security 

A week in security (August 5 – 11)

August 12, 2019 admin a week in security, APT28, awis, backdoors, bitcoin, bmi, brain-machine interface, chrome incognito, CTNT report, dslr flaw, Facebook, Fancy Bear, IBM X-Force Incident Response and Intelligence Services, IRIS, mark zuckerberg, Messenger Kids, phishing, protonmail, ransomware, robocall, robocall scam, sextortion, smart homes, steam, Strontium, weekly blog roundup

Credit to Author: Malwarebytes Labs| Date: Mon, 12 Aug 2019 15:38:31 +0000

The latest cybersecurity news for the week of August 5–11. We touch on problematic backdoors, the grim possibility of the Internet of Thoughts, and smart home improvement. We also released a retrospective report on ransomware.

Categories:

  • A week in security

Tags: a week in securityAPT28awisbackdoorsbitcoinbmibrain-machine interfacechrome incognitoCTNT reportdslr flawfacebookFancy BearIBM X-Force Incident Response and Intelligence ServicesIRISMark Zuckerbergmessenger kidsphishingprotonmailransomwarerobocallrobocall scamsextortionsmart homessteamStrontiumweekly blog roundup

(Read more…)

The post A week in security (August 5 – 11) appeared first on Malwarebytes Labs.

Read more

Connect with:

Recent Posts

  • Zoom watermarking: pros and cons
  • A Site Published Every Face from Parler’s Capitol Riot Videos
  • The Pace of Digital Acceleration, IT-OT Convergence, and Strong Relationships: The Top Executive Insights
  • Decarbonizing cities – how to harmonize buildings, mobility and infrastructure
  • Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop

Categories

  • ComputerWorld (1,520)
  • Fortinet (638)
  • Independent (3,197)
  • Kaspersky (1,114)
  • Krebs (601)
  • Magazine (93)
  • MalwareBytes (1,360)
  • Microsoft (587)
  • MotherBoard (849)
  • QuickHeal (390)
  • ScadaICS (2,230)
  • Schneider (2,230)
  • Securiteam (217)
  • Security (9,376)
  • Sophos (1,144)
  • TrendMicro (801)
  • VirusBulletin (93)
  • Wired (2,390)
Copyright © 2021 Computer Security Articles. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.