Biotech health care innovations meet security challenges

Credit to Author: Pieter Arntz| Date: Tue, 25 Feb 2020 17:54:06 +0000

Advancements in biotech could save thousands, if not millions of lives. But what security and privacy challenges do they introduce? We take a close look at recent innovations.

Categories:

Tags:

(Read more…)

The post Biotech health care innovations meet security challenges appeared first on Malwarebytes Labs.

Read more

Don’t Let the Vulnera-Bullies Win. Use our free tool to see if you are patched against Vulnerability CVE-2020-0601

Credit to Author: Trend Micro| Date: Fri, 17 Jan 2020 17:40:24 +0000

So much for a quiet January! By now you must have heard about the new Microsoft® vulnerability CVE-2020-0601, first disclosed by the NSA (making it the first Windows bug publicly attributed to the National Security Agency). This vulnerability is found in a cryptographic component that has a range of functions—an important one being the ability…

The post Don’t Let the Vulnera-Bullies Win. Use our free tool to see if you are patched against Vulnerability CVE-2020-0601 appeared first on .

Read more

Don’t Let the Vulnera-Bullies Win. Patch Against Vulnerability CVE-2020-0601 with our Free Tool!

Credit to Author: Trend Micro| Date: Fri, 17 Jan 2020 17:40:24 +0000

So much for a quiet January! By now you must have heard about the new Microsoft® vulnerability CVE-2020-0601, first disclosed by the NSA (making it the first Windows bug publicly attributed to the National Security Agency). This vulnerability is found in a cryptographic component that has a range of functions—an important one being the ability…

The post Don’t Let the Vulnera-Bullies Win. Patch Against Vulnerability CVE-2020-0601 with our Free Tool! appeared first on .

Read more

Oracle’s January 2020 update patches 334 security flaws

Credit to Author: John E Dunn| Date: Fri, 17 Jan 2020 11:31:27 +0000

The January 2020 update featured a joint record of 334 patches, matching an identical number released in July 2018.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/uQefUNviL2Q” height=”1″ width=”1″ alt=””/>

Read more

A New Playground for Cybercrime: Why Supply Chain Security Must Cover Software Development

Credit to Author: Bharat Mistry| Date: Thu, 24 Oct 2019 16:35:26 +0000

Most organisations see supply chains as providers of physical goods and services. The supply chain management function in these companies usually provides the governance framework to reduce third-party risks and prevent hackers from stealing data, disrupting daily operations and affecting business continuity. But there’s another crucial part of this ecosystem which some organisations may be…

The post A New Playground for Cybercrime: Why Supply Chain Security Must Cover Software Development appeared first on .

Read more

A week in security (October 14 – 20)

Credit to Author: Malwarebytes Labs| Date: Mon, 21 Oct 2019 15:45:45 +0000

Cybersecurity news for October 14 – 20, including the future of the password, the lingering threat of ransomware, and new security features from Instagram.

Categories:

Tags:

(Read more…)

The post A week in security (October 14 – 20) appeared first on Malwarebytes Labs.

Read more

Pulse VPN patched their vulnerability, but businesses are trailing behind

Credit to Author: Pieter Arntz| Date: Fri, 18 Oct 2019 16:36:36 +0000

After a vulnerability in a popular business VPN solutions was discussed at length and an easy to use exploit is availbale, organizations still fail to apply the patch. What’s up?

Categories:

Tags:

(Read more…)

The post Pulse VPN patched their vulnerability, but businesses are trailing behind appeared first on Malwarebytes Labs.

Read more

15,000 webcams vulnerable to attack: how to protect against webcam hacking

Credit to Author: Christopher Boyd| Date: Tue, 24 Sep 2019 17:19:23 +0000

We take a look at the ever-present threat of webcam hacking, and what you can do to avoid being caught out.

Categories:

Tags:

(Read more…)

The post 15,000 webcams vulnerable to attack: how to protect against webcam hacking appeared first on Malwarebytes Labs.

Read more

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

Credit to Author: Vasilios Hioureas| Date: Fri, 13 Sep 2019 20:44:52 +0000

When penetration testing for an organization, what OSINT tactics can researchers employ? We discuss how hacking with AWS buckets can provide more recon data and uncover any leaks.

Categories:

Tags:

(Read more…)

The post Hacking with AWS: incorporating leaky buckets into your OSINT workflow appeared first on Malwarebytes Labs.

Read more