The global data privacy roadmap: a question of risk

Credit to Author: David Ruiz| Date: Tue, 02 Apr 2019 15:00:00 +0000

For any American company taking steps outside the US market, global data privacy compliance is a question of risk versus reward.

Categories:

Tags:

(Read more…)

The post The global data privacy roadmap: a question of risk appeared first on Malwarebytes Labs.

Read more

A week in security (February 4 – 8)

Credit to Author: Malwarebytes Labs| Date: Mon, 11 Feb 2019 17:05:33 +0000

A roundup of security news from February 4 – 8, including Facebook’s secure messaging integration, Google’s changes to URLs, a scam involving the Kindle store and John Wick, and more.

Categories:

Tags:

(Read more…)

The post A week in security (February 4 – 8) appeared first on Malwarebytes Labs.

Read more

Movie stream ebooks gun for John Wick 3 on Kindle store

Credit to Author: Christopher Boyd| Date: Mon, 04 Feb 2019 17:30:37 +0000

Over the weekend, we observed a clever spam campaign using bogus ebooks dressed as John Wick 3 movie files to push links to streaming sites. Can John and your ability avoid web based scams survive?

Categories:

Tags:

(Read more…)

The post Movie stream ebooks gun for John Wick 3 on Kindle store appeared first on Malwarebytes Labs.

Read more

Bloomberg blunder highlights supply chain risks

Credit to Author: Adam McNeil| Date: Wed, 10 Oct 2018 16:00:00 +0000

A potentially erroneous report from Bloomberg claimed that Chinese spies were able to infiltrate US hardware supplier Supermicro, and therefore, our technology supply chain. Learn how this unverified story could ultimately come true—and what, if anything, can be done to stop it.

Categories:

Tags:

(Read more…)

The post Bloomberg blunder highlights supply chain risks appeared first on Malwarebytes Labs.

Read more

Researchers discover vulnerabilities in smart assistants’ voice commands

Credit to Author: Malwarebytes Labs| Date: Wed, 30 May 2018 16:59:51 +0000

Security researchers have now found new ways to exploit voice recognition weaknesses in your favorite home device: smart assistants. You may want to listen in.

Categories:

Tags:

(Read more…)

The post Researchers discover vulnerabilities in smart assistants’ voice commands appeared first on Malwarebytes Labs.

Read more