A scanning tool for open-sourced software packages? Yes, please!

Credit to Author: Malwarebytes Labs| Date: Mon, 09 May 2022 10:49:02 +0000

OpenSSF recently introduced a dynamic analysis tool for all OSS packages when uploaded to open source repositories.

The post A scanning tool for open-sourced software packages? Yes, please! appeared first on Malwarebytes Labs.

Read more

A week in security (May 2 – 8)

Credit to Author: Malwarebytes Labs| Date: Mon, 09 May 2022 10:20:30 +0000

The most important and interesting stories in security from the last seven days.

The post A week in security (May 2 – 8) appeared first on Malwarebytes Labs.

Read more

Google, Apple, and Microsoft step hand in hand into a passwordless future

Credit to Author: Pieter Arntz| Date: Sun, 08 May 2022 11:51:58 +0000

Three tech giants used World Password Day to announce their commitment to a passwordless future using FIDO Alliance standards.

The post Google, Apple, and Microsoft step hand in hand into a passwordless future appeared first on Malwarebytes Labs.

Read more

Your Phone May Soon Replace Many of Your Passwords

Credit to Author: BrianKrebs| Date: Sat, 07 May 2022 13:31:17 +0000

Apple, Google and Microsoft announced this week they will soon support an approach to authentication that avoids passwords altogether, and instead requires users to merely unlock their smartphones to sign in to websites or online services. Experts say the changes should help defeat many types of phishing attacks and ease the overall password burden on Internet users, but caution that a true passwordless future may still be years away for most websites.

Read more

Google fixes two critical Pixel vulnerabilities: Get your updates when you can!

Credit to Author: Pieter Arntz| Date: Thu, 05 May 2022 14:44:24 +0000

Google has released updates for Android and its Pixel phone. We discuss the three vulnerabilities that were classified as critical.

The post Google fixes two critical Pixel vulnerabilities: Get your updates when you can! appeared first on Malwarebytes Labs.

Read more

Download: UEM vendor comparison chart 2022

Credit to Author: Bob Violino, Valerie Potter| Date: Tue, 03 May 2022 03:00:00 -0700

Unified endpoint management (UEM) is a strategic IT approach that consolidates how enterprises secure and manage an array of deployed devices including phones, tablets, PCs, and even IoT devices.

To read this article in full, please click here

(Insider Story)

Read more

You Can Now Ask Google to Remove Your Phone Number, Email or Address from Search Results

Credit to Author: BrianKrebs| Date: Fri, 29 Apr 2022 19:25:49 +0000

Google said this week it is expanding the types of data people can ask to have removed from search results, to include personal contact information like your phone number, email address or physical address. The move comes just months after Google rolled out a new policy enabling people under the age of 18 (or a parent/guardian) to request removal of their images from Google search results.

Read more

Hackers fool major tech companies into handing over data of women and minors to abuse

Credit to Author: Jovi Umawing| Date: Thu, 28 Apr 2022 15:01:36 +0000

Law enforcement believes that these hackers duping major tech companies are teenagers. But they are causing severe harm.

The post Hackers fool major tech companies into handing over data of women and minors to abuse appeared first on Malwarebytes Labs.

Read more