Reading Time: ~6 min.This is the third of a three-part report on the state of three malware categories: miners, ransomware and information stealers. Ransomware is any malware that holds your data ransom. These days it usually involves encrypting a victim’s data before asking for cash (typically cryptocurrency) to decrypt it. Ransomware ruled the malware world since late 2013, but finally […]Read more
The time has come to say goodbye to Barcelona as we wrap up our time here at Mobile World Congress (MWC). Although it’s hard to believe that the show is already over, MWC 2019 managed to deliver a slew of showstoppers that captured our attention. Here are some of my main takeaways from the event: […]
The post What MWC 2019 Shows Us About the Future of Connectivity appeared first on McAfee Blogs.Read more
In some cases, attackers have demanded ransom, nude photos/videos of victims in exchange for stolen account, Trend Micro says.Read more
To effectively defend against today’s risks and threats, organizations must examine their failings as well as their successes.Read more
Security researcher Bob Diachenko discovered an unprotected 4.4GB Elasticsearch database chock-full of more than 2.4 million records of people and businesses considered to be high-risk by Dow Jones. A third-party company left this Dow Jones watchlist on a public server without even so much as a password to protect it.
The proprietary watchlist, hosted on Amazon Web Services (AWS), includes “special interest persons,” current and past politicians, people with terrorism links, sanctioned companies and individuals, as well as those convicted of financial crimes, according to TechCrunch.
New services, which are both available in preview, arrive at a time when two major trends are converging on security.Read more
Bots now account for 39.9% of all ticketing traffic, mostly originating in North America.Read more
Reading Time: ~5 min.The landscape of digital security is rapidly shifting, and even the largest tech giants are scrambling to keep up with new data regulations and cybersecurity threats. Small to medium-sized businesses (SMBs) are often left out of these important conversations, leaving themselves — and their users — vulnerable. In an effort to combat this trend, Webroot […]Read more