Trend Micro and INTERPOL: Teaming Up Again to Fight Global Cybercrime

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Wed, 26 Apr 2017 18:51:15 +0000

At Trend Micro we have a long history of partnering with law enforcement whenever called upon. We believe that the skills and resources of the private sector can offer allow law enforcement to surge and scale on any particular threat. Combatting the threat posed by transnational cyber criminal groups is ultimately a shared responsibility and…

Read more

iCloud support scams

Credit to Author: Thomas Reed| Date: Tue, 25 Apr 2017 16:00:07 +0000

Stay on the lookout for a new iCloud scam. A Malwarebytes employee reported receiving multiple calls claiming to be from Apple Support and asking for her credentials.

Categories:

Tags:

(Read more…)

The post iCloud support scams appeared first on Malwarebytes Labs.

Read more

A Storm’s a Coming: How businesses can defend against threat actor groups like Pawn Storm

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 25 Apr 2017 14:00:47 +0000

It's critical to hire a CISO that has experience and can lead a team.Pawn Storm (aka Sednit5, Fancy Bear, APT28, Sofacy and STRONTIUM8) might sound like Instagram accounts, top-secret spy programs or recently passed legislation, but in reality they are all different names for the same successful cyber espionage group (or threat actor group). These actors often use multi-angle bombardment attacks on the same target, implementing multiple methods…

Read more

Pawn Storm: The Power of Social Engineering

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 25 Apr 2017 12:00:02 +0000

Anyone familiar with Pawn Storm (a.k.a. APT28, Fancy Bear, Strontium, etc.) is likely to associate the group with highly sophisticated targeted attacks that compromise government and media agencies around the world. In our latest report, researchers expose the true nature and scope of the cyber espionage group’s attacks and methodologies. Pawn Storm has managed to…

Read more

Mobile Menace Monday: Securing your privacy on Android

Credit to Author: Nathan Collier| Date: Mon, 24 Apr 2017 15:00:31 +0000

If you work at a company that allows you to use your mobile device to login email, access company data, and/or connect to company Wi-Fi, you could be more of a risk than you think.

Categories:

Tags:

(Read more…)

The post Mobile Menace Monday: Securing your privacy on Android appeared first on Malwarebytes Labs.

Read more

Locky ransomware is back, but we already protect against it

Credit to Author: Malwarebytes Labs| Date: Fri, 21 Apr 2017 23:38:53 +0000

For a while, it appeared that Locky ransomware had completely disappeared and allowed for Cerber to take the number one spot as the most distributed piece of ransomware. But after a long absence, Locky returns in full swing.

Categories:

Tags:

(Read more…)

The post Locky ransomware is back, but we already protect against it appeared first on Malwarebytes Labs.

Read more