Building an incident response program: creating the framework

Credit to Author: Paul Kincaid| Date: Wed, 07 Mar 2018 17:00:32 +0000

An incident response plan does not need to be overly complicated. However, having a solid and tested framework for the program is key in the ability of an organization to respond to and survive a security incident.

Categories:

Tags:

(Read more…)

The post Building an incident response program: creating the framework appeared first on Malwarebytes Labs.

Read more

Human Factor Podcast: Jenny Radcliffe and Chris Boyd

Credit to Author: Christopher Boyd| Date: Tue, 27 Feb 2018 18:56:42 +0000

Hear Lead Malware Intelligence Analyst Chris Boyd talk about 10 years of experience in security and research on the Human Factor podcast hosted by Jenny Radcliffe.

Categories:

Tags:

(Read more…)

The post Human Factor Podcast: Jenny Radcliffe and Chris Boyd appeared first on Malwarebytes Labs.

Read more

How to protect your computer from malicious cryptomining

Credit to Author: Pieter Arntz| Date: Tue, 27 Feb 2018 17:30:00 +0000

When you experience a slow computer due to malicious cryptomining, how can you troubleshoot it and prevent it from happening again?

Categories:

Tags:

(Read more…)

The post How to protect your computer from malicious cryptomining appeared first on Malwarebytes Labs.

Read more

How to build an incident response program: GDPR guidelines

Credit to Author: Paul Kincaid| Date: Wed, 21 Feb 2018 09:00:00 +0000

With the General Data Protection Regulation (GDPR) going into effect this May, many organizations need to have a robust incident response program to ensure the safety of their customers’ and employees’ data. Here’s part one of our guidelines.

Categories:

Tags:

(Read more…)

The post How to build an incident response program: GDPR guidelines appeared first on Malwarebytes Labs.

Read more

Encryption 101: a malware analyst’s primer

Credit to Author: Vasilios Hioureas| Date: Tue, 20 Feb 2018 21:53:13 +0000

A primer on encryption mechanisms and how they are exploited by malware authors, including an introduction to encryption and the main methods used to encrypt ransomware.

Categories:

Tags:

(Read more…)

The post Encryption 101: a malware analyst’s primer appeared first on Malwarebytes Labs.

Read more

Physician, protect thyself: healthcare cybersecurity circling the drain

Credit to Author: Jovi Umawing| Date: Thu, 15 Feb 2018 16:00:00 +0000

Study after study reveals that healthcare cybersecurity breaches are on the uptick. In this blog series, we’ll look into the reasons why healthcare cybercrime is trending, understand the motivations of threat actors behind it, and discuss what the healthcare industry can do to care for itself and the people they swore to protect.

Categories:

Tags:

(Read more…)

The post Physician, protect thyself: healthcare cybersecurity circling the drain appeared first on Malwarebytes Labs.

Read more

Stop telephoning me-eh-eh-eh-eh: robocalls explained

Credit to Author: Jovi Umawing| Date: Thu, 01 Feb 2018 19:11:47 +0000

The Federal Communications Commission (FCC) has identified robocalls as the number one complaint from the public. In this post, we tell you what you need to know to protect against the nasty ones.

Categories:

Tags:

(Read more…)

The post Stop telephoning me-eh-eh-eh-eh: robocalls explained appeared first on Malwarebytes Labs.

Read more