Online Phishing: How to Stay Out of the Hackers’ Nets

Credit to Author: Trend Micro| Date: Wed, 20 Nov 2019 14:05:56 +0000

Phishing scams and social engineering continue to cause problems for social media users.

Despite the growing popularity of social media and messaging apps, email remains the preferred way to communicate online for millions of Americans. And the bad guys know it. Of the 28.6 billion cyber-threats Trend Micro blocked globally in the first half of 2019, over 24.3 billion were carried by email. That’s 91%. Many of these…

The post Online Phishing: How to Stay Out of the Hackers’ Nets appeared first on .

Read more

BlueKeep Attacks seen in the wild!

Credit to Author: Sameer Patil| Date: Fri, 08 Nov 2019 09:54:04 +0000

CVE-2019-0708, popularly known as BlueKeep, is a RDP pre-authentication vulnerability which allows attacker to compromise a vulnerable system without user’s interaction. This exploit is also wormable, meaning that it can spread to other vulnerable systems in a similar way as the WannaCry malware spread across the globe in 2017. Interestingly,…

Read more

Apple removes app that tracks Hong Kong police and protestors

Credit to Author: Danny Bradbury| Date: Fri, 11 Oct 2019 10:54:03 +0000

Apple was under fire this week after banning an app that tracked the location of both police and protesters in Hong Kong on a live map.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/NGy6SSRh_9k” height=”1″ width=”1″ alt=””/>

Read more

Decrypting What Zero Trust Is, And What It Likely Isn’t

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Fri, 04 Oct 2019 17:33:56 +0000

https://blog.trendmicro.com/answers-to-your-questions-on-our-mac-apps-store/

It’s always an indicator of confusion when instead of hearing “I want Q” I’m asked “what is Q?”. In this case the ‘Q’ is Zero Trust.  I’ll try and give my best take on what I understand Zero Trust to be. History Repeats Let’s start with the background. Quite a while back the Jericho Forum…

The post Decrypting What Zero Trust Is, And What It Likely Isn’t appeared first on .

Read more

This Week in Security News: Ransomware Campaigns Persist with WannaCry as Most Common

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 03 Sep 2019 17:36:02 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how a total of 118 new ransomware families emerged in the first half of 2018, but only 47 new ones debuted in the first six…

The post This Week in Security News: Ransomware Campaigns Persist with WannaCry as Most Common appeared first on .

Read more

Quick thinking by Portland Public Schools stops $2.9m BEC scam

Credit to Author: Danny Bradbury| Date: Thu, 22 Aug 2019 20:18:44 +0000

Employees at Portland Public Schools were breathing easier this week after thwarting a business email compromise (BEC) scam that could have cost them almost $3m.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/-aX8yPRl9QI” height=”1″ width=”1″ alt=””/>

Read more

How Do Threats Align With Detection And Solutions?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Mon, 19 Aug 2019 14:05:16 +0000

There are many different threats targeting many different areas of a corporate network. Have you ever wondered how those threats are stopped? What threats impact which areas of a network? What technology detects and blocks those threats? I wanted to build an interactive graphic to answer those questions. This interactive infographic can help you understand…

The post How Do Threats Align With Detection And Solutions? appeared first on .

Read more