Cellular networks under fire from Soft Cell attacks

Credit to Author: Christopher Boyd| Date: Fri, 12 Jul 2019 15:30:00 +0000

We break down the recently revealed attacks on telco operators around the globe, targeting specific high-value individuals.

Categories:

Tags:

(Read more…)

The post Cellular networks under fire from Soft Cell attacks appeared first on Malwarebytes Labs.

Read more

Caution: Misuse of security tools can turn against you

Credit to Author: Vasilios Hioureas| Date: Thu, 11 Jul 2019 17:34:57 +0000

If not implemented correctly, the very security tools we use to keep our information private may actually cause data leaks themselves. We outline a few cases and provide suggestions for researchers and security admins.

Categories:

Tags:

(Read more…)

The post Caution: Misuse of security tools can turn against you appeared first on Malwarebytes Labs.

Read more

What should a US federal data privacy law ideally include?

Credit to Author: David Ruiz| Date: Wed, 10 Jul 2019 15:00:00 +0000

What do small, privacy-protective companies think about a federal data privacy law for the US? It turns out, they’re all for it. Here are some of their ideas for US data privacy legislation.

Categories:

Tags:

(Read more…)

The post What should a US federal data privacy law ideally include? appeared first on Malwarebytes Labs.

Read more

Enterprise incident response: getting ahead of the wave

Credit to Author: William Tsing| Date: Wed, 10 Jul 2019 14:19:31 +0000

As with traditional warfare, beating back attacks and winning depends on having a plan. Here are several incident respond models security researchers have developed for responding to threats.

Categories:

Tags:

(Read more…)

The post Enterprise incident response: getting ahead of the wave appeared first on Malwarebytes Labs.

Read more

How to securely send your personal information

Credit to Author: Seth Rosenblatt| Date: Mon, 08 Jul 2019 16:00:00 +0000

On its own, email is not safe for sending credit card or passport numbers. Here’s how to securely send personal information over the Internet.

Categories:

Tags:

(Read more…)

The post How to securely send your personal information appeared first on Malwarebytes Labs.

Read more

A week in security (July 1 – 7)

Credit to Author: Malwarebytes Labs| Date: Mon, 08 Jul 2019 15:08:33 +0000

A roundup of cybersecurity news from July 1-7, including stalkerware, Bitcoin generators, app permissions, Chinese spyware, some giant leaks, and a new malware attack method.

Categories:

Tags:

(Read more…)

The post A week in security (July 1 – 7) appeared first on Malwarebytes Labs.

Read more

Steer clear of Bitcoin Cash generators

Credit to Author: Christopher Boyd| Date: Wed, 03 Jul 2019 18:19:20 +0000

We take a look at a number of sites claiming to offer free Bitcoin Cash money.

Categories:

Tags:

(Read more…)

The post Steer clear of Bitcoin Cash generators appeared first on Malwarebytes Labs.

Read more

Cooperating apps and automatic permissions are setting you up for failure

Credit to Author: Pieter Arntz| Date: Tue, 02 Jul 2019 16:53:10 +0000

Apps that cooperate and share permissions might seem convenient, but are they worth the security and privacy risk?

Categories:

Tags:

(Read more…)

The post Cooperating apps and automatic permissions are setting you up for failure appeared first on Malwarebytes Labs.

Read more

A week in security (June 24 – 30)

Credit to Author: Malwarebytes Labs| Date: Mon, 01 Jul 2019 17:02:56 +0000

A roundup of cybersecurity news from June 24–30, including top malicious web campaigns, updates on the GreenFlash Sundown exploit, a Malwarebytes initiative to double down on stalkerware detection and awareness, and more.

Categories:

Tags:

(Read more…)

The post A week in security (June 24 – 30) appeared first on Malwarebytes Labs.

Read more

Helping survivors of domestic abuse: What to do when you find stalkerware

Credit to Author: David Ruiz| Date: Mon, 01 Jul 2019 16:51:59 +0000

Starting today, we’re doing more to protect stalkerware victims than improve our detection capabilities. We’re helping survivors understand how to tell if they’re being watched on their devices—and how to safely get out of the situation.

Categories:

Tags:

(Read more…)

The post Helping survivors of domestic abuse: What to do when you find stalkerware appeared first on Malwarebytes Labs.

Read more