Beware! Your website might be delivering Emotet malware

In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog will shed light on how it has also become a “threat distributor”. We will also discuss server-side and client-side activity and how it spreads. Its self-propagation makes it all the more challenging…

Read more

Cyber News Rundown: Amazon User Receives Thousands of Alexa-Recorded Messages

Reading Time: ~2 min.Amazon User Receives Thousands of Alexa-Recorded Messages Upon requesting all his user data from Amazon, one user promptly received over 1,700 recorded messages from an Alexa device. Unfortunately, the individual didn’t own such a device. The messages were from a device belonging to complete stranger, and some of them could have easily been used to find […]

The post Cyber News Rundown: Amazon User Receives Thousands of Alexa-Recorded Messages appeared first on Webroot Blog.

Read more

How to Spot the Wrong Employee through Employee Tracking?

Often businesses have no clue about a breach that happens through employees, but is believed to be because of external threats. Having an endpoint security software on your company network is a smart measure to secure your sensitive data and root out the bad employees.

The post How to Spot the Wrong Employee through Employee Tracking? appeared first on REVE Antivirus.

Read more

Beware!! PDF Attachments Launching Android malware

As a normal user we receive multiple emails on a daily basis with PDF as an attachment. Recently, at Quick-Heal Security Lab, we observed a malicious PDF file sent to users as an attachment via a phishing mail. These PDF files look like a regular document but that’s not the…

Read more

Online Privacy Leaks – How to Avoid Personal Information Exposure?

Hackers having sharp attacking techniques find it quite lucrative to get into the personal lives of people and break out publically. Not just ordinary internet users like you and me, renowned celebrities have been victims of online privacy leaks too.

The post Online Privacy Leaks – How to Avoid Personal Information Exposure? appeared first on REVE Antivirus.

Read more

Symantec Blogs: Year in Review

A recap of some of the best stories of the year in cyber security from Symantec

Read more

Cybersecurity Trends to Watch Out for in 2019

Reading Time: ~5 min.The cybersecurity landscape is in constant flux, keeping our team busy researching the newest threats to keep our customers safe. As the new year approaches, we asked our cybersecurity experts to predict which security trends will have the most impact in 2019 and what consumers should prepare for. Continued Growth of Cryptojacking “Cryptojacking will continue […]

The post Cybersecurity Trends to Watch Out for in 2019 appeared first on Webroot Blog.

Read more

Cyber News Rundown: Facebook Bug Exposes User Photos

Reading Time: ~2 min.Facebook API Bug Reveals Photos from 6.8 Million Users Facebook announced this week that an API bug had been found that allowed third-party apps to access all user photos, rather than only those posted to their timeline. The vulnerability was only available for 12 days in mid-September, but could still impact up to 6.8 million […]

The post Cyber News Rundown: Facebook Bug Exposes User Photos appeared first on Webroot Blog.

Read more

FakeApp discovered on Google Play Store which increases download count and rating of other applications.

Quick Heal Security Lab has spotted few FakeApps with more than 50,000+ installations on Google Play Store. These applications appear to be genuine as a PDF reader, PDF Downloader, PDF Scanner etc., but don’t have such functionality. The main purpose of these apps is to increase the download count of…

Read more

Symantec and Demisto: Responding at Scale with the Right Information at the Right Time

Improving response by integrating security information from Symantec’s products into Demisto’s orchestration, automation, and response

Read more