{"id":17860,"date":"2020-03-02T10:10:09","date_gmt":"2020-03-02T18:10:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/03\/02\/news-11593\/"},"modified":"2020-03-02T10:10:09","modified_gmt":"2020-03-02T18:10:09","slug":"news-11593","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/03\/02\/news-11593\/","title":{"rendered":"Lock and Code S1Ep1: On RSA, the human element, and the week in security"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/lockandcode.podbean.com\/mf\/play\/3vmgi9\/Lock_and_Code_1_RSA_Conference_with_Britta_Glade_REVISION_1.mp3\"\/><\/p>\n<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 02 Mar 2020 17:15:47 +0000<\/strong><\/p>\n<p>Last week, we told you we were launching a fortnightly podcast, called <a rel=\"noreferrer noopener\" href=\"https:\/\/blog.malwarebytes.com\/podcast\/2020\/02\/introducing-lock-and-code-a-malwarebytes-labs-podcast\/\" target=\"_blank\">Lock and Code<\/a>. This week, we made good on our promise, with lots of headlines generated right here on Labs, as well as other security news around the web. In addition, we talk with Britta Glade, Director of Content and Curation for RSA Conference, about the theme for last week&#8217;s conference: &#8220;The Human Element,&#8221; plus which types of submissions do well and what types will almost always be rejected.<\/p>\n<p>Tune in for all this and more on the premiere episode of the first season of Lock and Code, with host David Ruiz.<\/p>\n<figure class=\"wp-block-audio\"><audio controls src=\"https:\/\/lockandcode.podbean.com\/mf\/play\/3vmgi9\/Lock_and_Code_1_RSA_Conference_with_Britta_Glade_REVISION_1.mp3\"><\/audio><\/figure>\n<p>You can also find us on the <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/lock-and-code\/id1500049667\">Apple iTunes store<\/a>, on <a href=\"https:\/\/play.google.com\/music\/listen#\/ps\/Iv5rmv4i6cjdk4r7ft23xzf72au\">Google Play Music<\/a>, plus whatever preferred podcast platform you use. <\/p>\n<p>We cover our own research on:<\/p>\n<ul>\n<li>Security challenges in the world of <a rel=\"noreferrer noopener\" href=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2020\/02\/biotech-health-care-innovations-meet-security-challenges\/\" target=\"_blank\">biotech healthcare<\/a><\/li>\n<li>A fake Content Delivery Network serving up a <a rel=\"noreferrer noopener\" aria-label=\"credit card skimmer (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/fraudsters-cloak-credit-card-skimmer-with-fake-content-delivery-network-ngrok-server\/\" target=\"_blank\">credit card skimmer<\/a><\/li>\n<li>Why Americans <a rel=\"noreferrer noopener\" aria-label=\"seem to accept stalkerware (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/stalkerware\/2020\/02\/stalkerware-and-online-stalking-are-accepted-by-americans-why\/\" target=\"_blank\">seem to accept stalkerware<\/a><\/li>\n<li>Mac adware <a rel=\"noreferrer noopener\" aria-label=\"can be more dangerous than Mac Malware (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/mac\/2020\/02\/mac-adware-is-more-sophisticated-dangerous-than-traditional-mac-malware\/\" target=\"_blank\">being more dangerous than Mac malware<\/a><\/li>\n<li>Why managed service providers (MSPs) are <a rel=\"noreferrer noopener\" aria-label=\"critical for business continuity (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/opinion\/2020\/02\/why-managed-service-providers-msp-are-critical-for-business-continuity\/\" target=\"_blank\">critical for business continuity<\/a> <\/li>\n<\/ul>\n<p>Plus, other cybersecurity news:<\/p>\n<ul>\n<li>All ears: Are your smart devices around the home <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/moniotrlab.ccis.neu.edu\/smart-speakers-study\/\" target=\"_blank\">accidentally tuning in<\/a> to your conversations? (Source: Moniotrlab)<\/li>\n<li>Think that group is private? Think again: Certain private WhatsApp group invites are <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.vice.com\/en_us\/article\/k7enqn\/google-is-letting-people-find-invites-to-some-private-whatsapp-groups\" target=\"_blank\">being indexed in Google<\/a>. (Source: Vice)<\/li>\n<li>Another day, another breach: This time around, it\u2019s Slickwraps who feel the burn via <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.theverge.com\/2020\/2\/25\/21153434\/slickwraps-apologizes-customers-bad-data-breach\" target=\"_blank\">content posted to a Medium blog<\/a>. (Source: The Verge)<\/li>\n<li>Scammers go for gold: It\u2019s Olympics time again, and that means scams are <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.techrepublic.com\/article\/summer-olympics-is-ripe-for-cyberattacks\/\" target=\"_blank\">almost certainly on the way<\/a> (Source: Tech Republic)<\/li>\n<li>E-scooters vulnerable to attack? Researchers <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.itp.net\/security\/91518-electric-scooters-could-be-vulnerable-to-remote-hacks\" target=\"_blank\">report their findings<\/a> on how open to abuse these popular devices are. (Source: ITP.net)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/podcast\/2020\/03\/lock-and-code-s1ep1-on-rsa-the-human-element-and-the-week-in-security\/\">Lock and Code S1Ep1: On RSA, the human element, and the week in security<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/podcast\/2020\/03\/lock-and-code-s1ep1-on-rsa-the-human-element-and-the-week-in-security\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 02 Mar 2020 17:15:47 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/podcast\/2020\/03\/lock-and-code-s1ep1-on-rsa-the-human-element-and-the-week-in-security\/' title='Lock and Code S1Ep1: On RSA, the human element, and the week in security'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/Lock-and-Code-Updated-Artwork.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We look at all the interesting security news from last week and also present the latest episode of our podcast, Lock and Code.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/podcast\/\" rel=\"category tag\">Podcast<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/lock-and-code\/\" rel=\"tag\">lock and code<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/podcast\/\" rel=\"tag\">podcast<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/scams\/\" rel=\"tag\">scams<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/security\/\" rel=\"tag\">security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/threats\/\" rel=\"tag\">threats<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week-in-security\/\" rel=\"tag\">week in security<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/podcast\/2020\/03\/lock-and-code-s1ep1-on-rsa-the-human-element-and-the-week-in-security\/' title='Lock and Code S1Ep1: On RSA, the human element, and the week in security'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/podcast\/2020\/03\/lock-and-code-s1ep1-on-rsa-the-human-element-and-the-week-in-security\/\">Lock and Code S1Ep1: On RSA, the human element, and the week in security<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[24306,3764,5820,10574,714,10438,10498],"class_list":["post-17860","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-lock-and-code","tag-malware","tag-podcast","tag-scams","tag-security","tag-threats","tag-week-in-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17860"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17860\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17860"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}