Facebook bans coronavirus ‘miracle cure’ ads

Credit to Author: Lisa Vaas| Date: Thu, 27 Feb 2020 10:50:38 +0000

Facebook, like other platforms, has seen fake news, mass-buying of face masks, and misinformation about bleach being a cure for COVID-19.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/9dojXZGW3Is” height=”1″ width=”1″ alt=””/>

Read more

Hackers Expand Their Repertoire as Trend Micro Blocks 52 Billion Threats in 2019

Credit to Author: Trend Micro| Date: Tue, 25 Feb 2020 15:56:29 +0000

Variety is welcome in most walks of life, but not when it comes to the threat landscape. Yet that is unfortunately the reality facing modern cybersecurity professionals. As Trend Micro’s 2019  roundup report reveals, hackers have an unprecedented array of tools, techniques and procedures at their disposal today. With 52 billion unique threats detected by…

The post Hackers Expand Their Repertoire as Trend Micro Blocks 52 Billion Threats in 2019 appeared first on .

Read more

Ransomware attack forces 2-day shutdown of natural gas pipeline

Credit to Author: Lisa Vaas| Date: Thu, 20 Feb 2020 14:35:31 +0000

The attacker(s) infected both IT and operational networks with an unspecified ransomware strain, though the facility never lost control.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/YqiqInxA_Kc” height=”1″ width=”1″ alt=””/>

Read more

Private photos leaked by PhotoSquared’s unsecured cloud storage

Credit to Author: Lisa Vaas| Date: Wed, 19 Feb 2020 11:49:20 +0000

With no password required and no encryption in place, a burglar or ID thief could have seen your photos, your address and more.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/v6L-VwD68-Y” height=”1″ width=”1″ alt=””/>

Read more

Changing the Monolith—Part 4: Quick tech wins for a cloud-first world

Credit to Author: Todd VanderArk| Date: Thu, 13 Feb 2020 18:00:25 +0000

Transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people and technology that make up an organization.

The post Changing the Monolith—Part 4: Quick tech wins for a cloud-first world appeared first on Microsoft Security.

Read more

Securing the MSP: why they’re their own worst enemy

Credit to Author: William Tsing| Date: Thu, 30 Jan 2020 16:00:00 +0000

Behind each cyberattack on the MSP is typically a system left unpatched, asset management undone, security officer not hired, or board who sees investment in security as a cost center rather than a long-term investment.

Categories:

Tags:

(Read more…)

The post Securing the MSP: why they’re their own worst enemy appeared first on Malwarebytes Labs.

Read more

FBI: Cybercrime tore a $3.5b hole in victims’ pockets last year

Credit to Author: Lisa Vaas| Date: Thu, 13 Feb 2020 12:45:23 +0000

The FBI’s Internet Crime Report shows that business email comprise is the biggest money-maker for cybercriminals.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/z_YNbnD3_LU” height=”1″ width=”1″ alt=””/>

Read more