A week in security (July 9 – July 15)

Credit to Author: Malwarebytes Labs| Date: Mon, 16 Jul 2018 15:00:01 +0000

A roundup of the security news from July 9 – July 15, including sextortion, Spectre, cryptomining, mobile malware, ICO scams and more.

Categories:

Tags:

(Read more…)

The post A week in security (July 9 – July 15) appeared first on Malwarebytes Labs.

Read more

So you’ve been asked to start a threat intel program

Credit to Author: William Tsing| Date: Tue, 10 Jul 2018 15:00:00 +0000

What are the bumps in the road you can expect and avoid when setting up a threat intel progarm for your business?

Categories:

Tags:

(Read more…)

The post So you’ve been asked to start a threat intel program appeared first on Malwarebytes Labs.

Read more

Tech support scams: what are other people doing?

Credit to Author: William Tsing| Date: Wed, 07 Jun 2017 14:00:38 +0000

We’ve talked a lot about tech support scams over the past few years, typically focused on what we see ourselves, and the scammers who like to pose as Malwarebytes. But tech support scams are much bigger than that, targeting every tech company under the sun. So what are other people doing about it? Let’s take a look at some of the other players working to keep you safe.

Categories:

Tags:

(Read more…)

The post Tech support scams: what are other people doing? appeared first on Malwarebytes Labs.

Read more

OWASP Top Ten – Boring security that pays off

Credit to Author: William Tsing| Date: Thu, 04 May 2017 16:00:28 +0000

OWASP recently published a draft list of the top 10 security vulnerabilities of 2017. While intended for developers seeking to code more secure applications, the top 10 list is based on actual survey data of threats seen in the wild and serves as a great starting point for organizations struggling with security priorities. Let’s take a look and see how long they’ve been around prior to publication.

Categories:

Tags:

(Read more…)

The post OWASP Top Ten – Boring security that pays off appeared first on Malwarebytes Labs.

Read more

How do I get my employees to stop clicking on everything?

If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has been bedeviling. How do you get your employees to stop clicking on everything?

Categories:

Tags:

(Read more…)

Read more