The BEC List: Helping Thwart Business Email Compromise through Collaboration

Credit to Author: Trend Micro| Date: Thu, 11 Oct 2018 19:30:01 +0000

Today, the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) gave the JD Falk Award to the Business Email Compromise (BEC) List. The BEC List comprises cybersecurity firms, researchers and internet infrastructure companies that help deal with cybercriminal activities and schemes. The JD Falk Award is given to individuals or groups whose meritorious work has…

The post The BEC List: Helping Thwart Business Email Compromise through Collaboration appeared first on .

Read more

This Week in Security News: Tracking and Hacking

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 07 Sep 2018 11:30:46 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.  This week, Google revealed a secret deal with Mastercard that allows it to track what users buy offline. Also, Senate and House representatives warn that regulation may be coming for…

The post This Week in Security News: Tracking and Hacking appeared first on .

Read more

Stop Impersonations of Your CEO by Checking the Writing Style

Credit to Author: Chris Taylor| Date: Wed, 05 Sep 2018 19:25:23 +0000

If one of your employees receives an email that looks like it’s from the CEO asking to send sensitive data or to make a wire transfer, could that employee spot it as a fake based on how it is written? He or she may be so concerned with pleasing the CEO that they may urgently…

The post Stop Impersonations of Your CEO by Checking the Writing Style appeared first on .

Read more

BEC is Big Business for Hackers: What makes these attacks so hard to prevent?

Credit to Author: Trend Micro| Date: Fri, 31 Aug 2018 15:34:48 +0000

For years, one of the most lucrative ways for hackers to generate profits was through ransomware attacks. These instances involve the use of strong encryption to lock victims out of their files and data – attackers then sell the decryption key in exchange for an untraceable Bitcoin ransom payment. Now, however, another highly profitable attack…

The post BEC is Big Business for Hackers: What makes these attacks so hard to prevent? appeared first on .

Read more

A week in security (July 16 – July 22)

Credit to Author: Malwarebytes Labs| Date: Mon, 23 Jul 2018 17:30:01 +0000

A round up of the security news from July 16 – July 22, including the release of our quarterly Cybercrime tactics and techniques report, breaches, airport security, bug bounties, and more.

Categories:

Tags:

(Read more…)

The post A week in security (July 16 – July 22) appeared first on Malwarebytes Labs.

Read more

Insider threats in your work inbox

Credit to Author: Malwarebytes Labs| Date: Fri, 01 Sep 2017 16:52:23 +0000

A new phishing campaign that targets businesses goes beyond business email compromise or CEO fraud.

Categories:

Tags:

(Read more…)

The post Insider threats in your work inbox appeared first on Malwarebytes Labs.

Read more