email

QuickHealSecurity

Ghost Has Arrived

Credit to Author: Ghanshyam More| Date: Fri, 14 Dec 2018 11:58:50 +0000

On the back of an upswing in Ransomware activity, we decided to carry out an in-depth analysis of Ghost Ransomware. Interesting fact about this malware is that it uses multiple components to encrypt user files. Technical Analysis : Main malware executable (Ghost.exe) is compiled using the DotNet Framework. The infection…

Read More
ComputerWorldIndependent

Gmail encryption: Everything you need to know

Credit to Author: JR Raphael| Date: Thu, 22 Nov 2018 04:00:00 -0800

Encryption may sound like a subject best left to hackers and tinfoil hat wearers, but don’t be fooled: It’s a critical part of contemporary life and something that’s important for everyone, especially business users, to understand. And one of the places where encryption is most relevant and misunderstood is in the realm of email.

If you’re using Gmail for electronic communication — be it for business, for personal use, or a combination of the two — it’s well worth your while to know how the service does and doesn’t secure your information and what steps you can take to make sure you’re getting the level of privacy you need.

Ready to dive in?

To read this article in full, please click here

Read More
MalwareBytesSecurity

100 channels and nothing on, except TV Licensing phishes

Credit to Author: Christopher Boyd| Date: Tue, 25 Sep 2018 09:00:00 +0000

A recent bout of TV Licensing phishing emails promise British users a refund once they log in to a phony TV License website and provide payment details. Read on to see if you’ve been impacted.

Categories:

Tags:

(Read more…)

The post 100 channels and nothing on, except TV Licensing phishes appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

5 safe ways to get back at spammers: a guide to wasting time

Credit to Author: Christopher Boyd| Date: Tue, 11 Sep 2018 15:00:00 +0000

We take a look at some of the safe ways to waste a spammer’s time, whether by email or telephone.

Categories:

Tags:

(Read more…)

The post 5 safe ways to get back at spammers: a guide to wasting time appeared first on Malwarebytes Labs.

Read More