A week in security (March 2 – 8)

Credit to Author: Malwarebytes Labs| Date: Mon, 09 Mar 2020 20:07:46 +0000

A roundup of the previous week’s security headlines, including the introduction of a new series on child identity theft, an examination of law enforcement’s cybersecurity woes, a progress check on our stalkerware initiative, and more coronavirus scammers on the prowl.

Categories:

Tags:

(Read more…)

The post A week in security (March 2 – 8) appeared first on Malwarebytes Labs.

Read more

Facebook bans coronavirus ‘miracle cure’ ads

Credit to Author: Lisa Vaas| Date: Thu, 27 Feb 2020 10:50:38 +0000

Facebook, like other platforms, has seen fake news, mass-buying of face masks, and misinformation about bleach being a cure for COVID-19.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/9dojXZGW3Is” height=”1″ width=”1″ alt=””/>

Read more

Hackers Expand Their Repertoire as Trend Micro Blocks 52 Billion Threats in 2019

Credit to Author: Trend Micro| Date: Tue, 25 Feb 2020 15:56:29 +0000

Variety is welcome in most walks of life, but not when it comes to the threat landscape. Yet that is unfortunately the reality facing modern cybersecurity professionals. As Trend Micro’s 2019  roundup report reveals, hackers have an unprecedented array of tools, techniques and procedures at their disposal today. With 52 billion unique threats detected by…

The post Hackers Expand Their Repertoire as Trend Micro Blocks 52 Billion Threats in 2019 appeared first on .

Read more

Ransomware attack forces 2-day shutdown of natural gas pipeline

Credit to Author: Lisa Vaas| Date: Thu, 20 Feb 2020 14:35:31 +0000

The attacker(s) infected both IT and operational networks with an unspecified ransomware strain, though the facility never lost control.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/YqiqInxA_Kc” height=”1″ width=”1″ alt=””/>

Read more

Private photos leaked by PhotoSquared’s unsecured cloud storage

Credit to Author: Lisa Vaas| Date: Wed, 19 Feb 2020 11:49:20 +0000

With no password required and no encryption in place, a burglar or ID thief could have seen your photos, your address and more.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/v6L-VwD68-Y” height=”1″ width=”1″ alt=””/>

Read more

Changing the Monolith—Part 4: Quick tech wins for a cloud-first world

Credit to Author: Todd VanderArk| Date: Thu, 13 Feb 2020 18:00:25 +0000

Transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people and technology that make up an organization.

The post Changing the Monolith—Part 4: Quick tech wins for a cloud-first world appeared first on Microsoft Security.

Read more