Labs report finds cyberthreats against healthcare increasing while security circles the drain

Credit to Author: Wendy Zamora| Date: Wed, 13 Nov 2019 13:00:00 +0000

In this special edition of our quarterly CTNT report, we focus on the top attack methods and threats plaguing the healthcare industry over the last year, plus highlight recurring security challenges and reasons why cybercriminals target patient data.

Categories:

Tags:

(Read more…)

The post Labs report finds cyberthreats against healthcare increasing while security circles the drain appeared first on Malwarebytes Labs.

Read more

Florida city sends $742K to fraudsters as it bites the BEC hook

Credit to Author: Lisa Vaas| Date: Tue, 05 Nov 2019 12:43:11 +0000

“Here’s our new bank account number,” the scammers said. When the real construction firm sent their invoice, payment was made to the crooks.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/jj_w1wR5CJo” height=”1″ width=”1″ alt=””/>

Read more

Attacker uses tricky technique of Excel 4.0 in Malspam campaign

Credit to Author: Anjali Raut| Date: Sat, 02 Nov 2019 12:56:15 +0000

Use of Phishing emails is not new for cyber-attack and is still one of the classic strategies to compromise a victim’s machine. Cyber criminals lure victims to open email attachments (mostly Doc and XLS files) by faking them to look like important one using keywords like invoice, payment, finance, order…

Read more

Help prevent disaster donation scams from causing more misery

Credit to Author: Christopher Boyd| Date: Wed, 30 Oct 2019 20:36:21 +0000

Scammers will stop at nothing—not even a tragic natural disaster—for a chance to cash in. We offer some helpful tips to avoid disaster donation scams.

Categories:

Tags:

(Read more…)

The post Help prevent disaster donation scams from causing more misery appeared first on Malwarebytes Labs.

Read more

Facebook launches $2m suit against alleged phishing, hacking sites

Credit to Author: Lisa Vaas| Date: Wed, 30 Oct 2019 11:33:21 +0000

Facebook is using trademark law to target the operators of sites that imitate or target Facebook and Instagram sites.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/g_OViBXsCtw” height=”1″ width=”1″ alt=””/>

Read more

Old School aber erfolgreich: Mit Phishing-SMS Passwörter abgreifen

Credit to Author: Jörg Schindler| Date: Wed, 23 Oct 2019 08:39:56 +0000

Die meisten Leute denken, dass Phishing-Attacken generell via Mail kommen. Das stimmt auch größtenteils, denn das großflächige Verteilen via Elektropost ist eine günstige und effektive Angriffsmethode. Doch längst nicht alle Phishing-Attacken kommen per Mail. Phishing ist mit jeglicher elektronischer Kommunikation möglich, einschließlich Social Media, Instant Messaging und sogar über die gute alte SMS &#8211; um [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/ibA-CnhYNcU” height=”1″ width=”1″ alt=””/>

Read more

This Diwali, gift your loved ones digital security for life!

Credit to Author: Sushmita Kalashikar| Date: Fri, 25 Oct 2019 11:54:35 +0000

Diwali is that time of the year when you can literally feel the auspiciousness, fun and festivities in the air. While the streets are lightened with the bright glow of diyas and lamps, the night sky is adored by the sparkling light and boom of firecrackers. The hustle and bustle…

Read more