Los extraños mensajes de Twitter fueron un desliz, no un hack

Credit to Author: Naked Security| Date: Mon, 22 Oct 2018 16:32:06 +0000

¿Eres uno de los muchos usuarios de Twitter que has recibido un mensaje extraño como el siguiente? Does anyone know what this twitter notification could possibly mean? https://t.co/iY6hQNLOgy&#8212; Nigella Lawson (@Nigella_Lawson) October 16, 2018 Los mensajes consistían en una larga cadena de lo que parecían números y letras aleatorios. Se trataba de algo tan misterioso [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/oO7OYGiwQCE” height=”1″ width=”1″ alt=””/>

Read more

A week in security (October 15 – 21)

Credit to Author: Malwarebytes Labs| Date: Mon, 22 Oct 2018 16:23:14 +0000

A roundup of the security news from October 15–21, including how to build your own security camera, the FIDO standard, Twitter information operations, and our Q3 CTNT report.

Categories:

Tags:

(Read more…)

The post A week in security (October 15 – 21) appeared first on Malwarebytes Labs.

Read more

Information operations on Twitter: new data released on election tampering

Credit to Author: Christopher Boyd| Date: Thu, 18 Oct 2018 15:00:00 +0000

New information released by Twitter sheds fresh light on the various professional troll campaigns deployed alongside the 2016 presidential elections.

Categories:

Tags:

(Read more…)

The post Information operations on Twitter: new data released on election tampering appeared first on Malwarebytes Labs.

Read more

6 ways to keep up with cybersecurity without going crazy

Credit to Author: Kayla Matthews| Date: Thu, 11 Oct 2018 15:00:00 +0000

As we dive headfirst into National Cyber Security Awareness Month, it seems only fitting to discuss ways to stay on top of cybersecurity news. But what if following along makes you feel a little overwhelmed? Try these six methods of information-gathering to brush up on your cybersecurity know-how without losing your mind.

Categories:

Tags:

(Read more…)

The post 6 ways to keep up with cybersecurity without going crazy appeared first on Malwarebytes Labs.

Read more

When Security Researchers Pose as Cybercrooks, Who Can Tell the Difference?

Credit to Author: BrianKrebs| Date: Tue, 02 Oct 2018 23:42:24 +0000

A ridiculous number of companies are exposing some or all of their proprietary and customer data by putting it in the cloud without any kind of authentication needed to read, alter or destroy it. When cybercriminals are the first to discover these missteps, usually the outcome is a demand for money in return for the stolen data. But when these screw-ups are unearthed by security professionals seeking to make a name for themselves, the resulting publicity often can leave the breached organization wishing they’d instead been quietly extorted by anonymous crooks.

Read more