The top 5 dumbest cyber threats that work anyway

The common conception of cyber attacks is kind of like bad weather: ranging from irritating to catastrophic, but always unpredictable. Hackers are simply too sophisticated to draw any reliable judgments on and we shouldn’t try. As it turns out, some hackers are fairly predictable in their successful use of really dumb attacks.

Categories:

Tags:

(Read more…)

The post The top 5 dumbest cyber threats that work anyway appeared first on Malwarebytes Labs.

Continue reading The top 5 dumbest cyber threats that work anyway

Your ISP, browsing history, and what to do about it

In late March, Congress approved a bill lifting restrictions imposed on ISPs last year concerning what they could do with information such as customer browsing habits, app usage history, location data, and Social Security numbers. Given that the repea… Continue reading Your ISP, browsing history, and what to do about it

Tech support scammers and their banking woes

We all know about tech support scams by this point. Unfortunately for the scammers, banks know this as well, making it quite difficult at times to maintain an account to store the criminal’s ill-gotten gains. So how does the enterprising criminal cash out with your money? Let’s take a look.

Categories:

Tags:

(Read more…)

The post Tech support scammers and their banking woes appeared first on Malwarebytes Labs.

Continue reading Tech support scammers and their banking woes

How do I secure my social media profile?

Quitting social media entirely can be unrealistic, or at least seriously unfun. So it’s important to take a moment to check out account settings before you start, to make absolutely sure you’re okay with the service’s default settings.

Categories:

Tags:

(Read more…)

Continue reading How do I secure my social media profile?

Why do I care about someone else’s data breach?

As the size of your organization increases, the probability that an individual employee’s company email is in that breach rises to 1. So how do you go about plugging leaks? A three-point strategy can get you started.

Categories:

Tags:

(Read more…)

Continue reading Why do I care about someone else’s data breach?

How do I get my employees to stop clicking on everything?

If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has been bedeviling. How do you get your employees to stop clicking on everything?

Categories:

Tags:

(Read more…)

Continue reading How do I get my employees to stop clicking on everything?

How do I get my employees to stop clicking on everything?

If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has been bedeviling. How do you get your employees to stop clicking on everything?

Categories:

Tags:

(Read more…)

Continue reading How do I get my employees to stop clicking on everything?

Vetting your vendors: money isn’t everything

Vetting vendors doesn’t have to be painful – if you know your risk tolerance posture, and have a mature communication channel with your own security team.Categories: Business
Security world
TechnologyTags: cyber threatscybersecurityinfosecmalvertisin… Continue reading Vetting your vendors: money isn’t everything

Tech support scams, stolen data, and botnets

We’ve found a scam in a box company that also offers intelligence leads. That is, they’ll sell you the scam and point you at the most vulnerable targets first.

Categories:

Tags:

(Read more…)

Continue reading Tech support scams, stolen data, and botnets