Google stops indexing WhatsApp chats; other search engines still at it

Credit to Author: Lisa Vaas| Date: Tue, 25 Feb 2020 17:51:22 +0000

Private chat invites aren’t meant to be unfindable, Facebook says, though a snippet of code eventually shielded them from Google indexing.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/De9SWjTWYs0″ height=”1″ width=”1″ alt=””/>

Read more

Introducing Lock and Code: a Malwarebytes Labs podcast

Credit to Author: Malwarebytes Labs| Date: Tue, 25 Feb 2020 17:27:17 +0000

Malwarebytes is launching a podcast, called Lock and Code, on Monday, March 2, breaking down cybersecurity headlines and diving into complex issues with guest interviews. Tune in every two weeks.

Categories:

Tags:

(Read more…)

The post Introducing Lock and Code: a Malwarebytes Labs podcast appeared first on Malwarebytes Labs.

Read more

New Sophos Central management and reporting for XG Firewall

Credit to Author: Chris McCormack| Date: Tue, 25 Feb 2020 15:20:00 +0000

Sophos Central now includes group firewall management and flexible, cloud-based firewall reporting – for free.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/RElydU5nWoY” height=”1″ width=”1″ alt=””/>

Read more

Hackers Expand Their Repertoire as Trend Micro Blocks 52 Billion Threats in 2019

Credit to Author: Trend Micro| Date: Tue, 25 Feb 2020 15:56:29 +0000

Variety is welcome in most walks of life, but not when it comes to the threat landscape. Yet that is unfortunately the reality facing modern cybersecurity professionals. As Trend Micro’s 2019  roundup report reveals, hackers have an unprecedented array of tools, techniques and procedures at their disposal today. With 52 billion unique threats detected by…

The post Hackers Expand Their Repertoire as Trend Micro Blocks 52 Billion Threats in 2019 appeared first on .

Read more

How I learned to stop worrying and love ‘grey hat’ tools

Credit to Author: Tad Heppner| Date: Tue, 25 Feb 2020 13:45:19 +0000

A comprehensive security solution needs a sense of subtlety: not all machine code lends itself to be classified easily as malicious. As with most things in life, there&#8217;s a grey area in malware detection that includes hacking tools, poorly designed or easily exploitable applications, or borderline adware that provides little benefit to the unfortunate user [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/TR1pieWZO1k” height=”1″ width=”1″ alt=””/>

Read more

Harden your public cloud environment against APT-style attacks

Credit to Author: Editor| Date: Tue, 25 Feb 2020 13:36:43 +0000

A new APT-style attack combines a bypassing technique with a multi-platform payload to target both Windows and Linux cloud workloads. Stop the attack with technical advice from Sophos.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/q61MwUx5OsI” height=”1″ width=”1″ alt=””/>

Read more

‘Cloud Snooper’ Attack Bypasses Firewall Security Measures

Credit to Author: Sergei Shevchenko| Date: Tue, 25 Feb 2020 13:30:43 +0000

In the course of investigating a malware infection of cloud infrastructure servers hosted in the Amazon Web Services (AWS) cloud, SophosLabs discovered a sophisticated attack that employed a unique combination of techniques to evade detection and that permits the malware to communicate freely with its command and control (C2) servers through a firewall that should, [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/IHnT34CbOqM” height=”1″ width=”1″ alt=””/>

Read more

In Safe Hands with Trend Micro Home Network Security – Part 3: Testing Its Functions

Credit to Author: Trend Micro| Date: Tue, 25 Feb 2020 14:05:34 +0000

We continue our four-part series on protecting your home and family. See the links to the previous parts at the end of this blog. As you use more internet-connected devices and smart appliances in your home, it’s of utmost importance to make sure your gadgets are properly protected from malware and hackers—and Trend Micro Home…

The post In Safe Hands with Trend Micro Home Network Security – Part 3: Testing Its Functions appeared first on .

Read more