hacking

MalwareBytesSecurity

Tomorrowland festival goers affected by data breach

Credit to Author: Christopher Boyd| Date: Wed, 31 Oct 2018 17:27:32 +0000

A data breach from a 2014 Tomorrowland electronic music festival has affected up to 60,000 event-goers caught up in the action.

Categories:

Tags:

(Read more…)

The post Tomorrowland festival goers affected by data breach appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Compromising vital infrastructure: how voting machines and elections are vulnerable

Credit to Author: Pieter Arntz| Date: Tue, 23 Oct 2018 12:00:00 +0000

What are our options for secure and honest election results? Should we be using voting machines or are there better alternatives?

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: how voting machines and elections are vulnerable appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Bloomberg blunder highlights supply chain risks

Credit to Author: Adam McNeil| Date: Wed, 10 Oct 2018 16:00:00 +0000

A potentially erroneous report from Bloomberg claimed that Chinese spies were able to infiltrate US hardware supplier Supermicro, and therefore, our technology supply chain. Learn how this unverified story could ultimately come true—and what, if anything, can be done to stop it.

Categories:

Tags:

(Read more…)

The post Bloomberg blunder highlights supply chain risks appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

LoJack for computers used to attack European government bodies

Credit to Author: Malwarebytes Labs| Date: Thu, 04 Oct 2018 15:00:00 +0000

Security researchers have detected the first known instance of a UEFI bootkit being used against government bodies in Central and Eastern Europe. The attack relies on a persistence mechanism stolen from a legitimate software called Computrace—essentially LoJack for computers—that comes by default on many machines.

Categories:

Tags:

(Read more…)

The post LoJack for computers used to attack European government bodies appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

How to protect your data from Magecart and other e-commerce attacks

Credit to Author: Malwarebytes Labs| Date: Fri, 28 Sep 2018 15:00:57 +0000

Magecart and other criminal groups are causing mayhem by stealing payment information from e-commerce sites, big and small. Learn how they are doing it and how to mitigate against it.

Categories:

Tags:

(Read more…)

The post How to protect your data from Magecart and other e-commerce attacks appeared first on Malwarebytes Labs.

Read More
ComputerWorldIndependent

How Microsoft became tech’s good guy

Credit to Author: Preston Gralla| Date: Mon, 06 Aug 2018 03:00:00 -0700

Once upon a time, Microsoft symbolized all that was wrong with the tech world: greedy, monopolistic, single-mindedly focused on profits while caring little about the public good. In the heyday of Bill Gates and Steve Ballmer, the company ran roughshod over competitors in its attempt to corral the worldwide market for both operating systems and application software.

But today, Microsoft has embraced the role of the tech world’s better angel. And as events show in recent weeks, that’s not hype. The company has, to some extent, tried to act as the industry’s conscience as well as taking actions for the greater good.

One case in point: Microsoft’s recent revelation that it had uncovered evidence that the Russian government had targeted three congressional campaigns in the upcoming midterm elections — and that it had helped thwart the plot. Microsoft discovered the attempts as part of its long-running battle against the Russian government–backed hacking cyber-espionage group called Fancy Bear. Microsoft, which has been playing whack-a-mole with the group for well over a year, targets the command-and-control servers that control malware that Fancy Bear plants on victims’ computers, as well as associated websites that install malware on targets’ computers when the victims visit them as a result of a spearphishing attack.

To read this article in full, please click here

Read More