Amazon third party sellers: A new threat

Credit to Author: William Tsing| Date: Fri, 14 Apr 2017 15:00:06 +0000

On Monday, the Wall Street Journal reported a wave of hijacked Amazon seller accounts that proceeded to fleece buyers for large sums of money. As reported here, attackers would use credentials harvested from other breaches to take over the account, then either simply redirect funds to their own deposit account or create lots of fake…

Categories:

Tags:

(Read more…)

The post Amazon third party sellers: A new threat appeared first on Malwarebytes Labs.

Read more

How to Protect Your iCloud Account, Juuust in Case Those Hackers Aren’t Joking

Credit to Author: Lily Hay Newman| Date: Sun, 26 Mar 2017 11:00:55 +0000

How to Protect Your iCloud Account, Juuust in Case Those Hackers Aren’t Joking

Hackers claim that they’ll wipe out hundreds of millions of iCloud accounts on April 7. Apple says there’s no breach. Here’s what to do in the meantime. The post How to Protect Your iCloud Account, Juuust in Case Those Hackers Aren’t Joking appeared first on WIRED.

Read more

Phishing 101 at the School of Hard Knocks

Credit to Author: BrianKrebs| Date: Fri, 24 Mar 2017 16:03:21 +0000

A recent, massive spike in sophisticated and successful phishing attacks is prompting many universities to speed up timetables for deploying mandatory two-factor authentication (2FA) — requiring a one-time code in addition to a password — for access to student and faculty services online. This is the story of one university that accelerated plans to require 2FA after witnessing nearly twice as many phishing victims in the first two-and-half months of this year than it saw in all of 2015.

Read more

What to do after recovering from a cyberattack

Credit to Author: Malwarebytes Labs| Date: Thu, 23 Feb 2017 18:00:04 +0000

More companies are falling victim to cyberattacks, as a wide range of harmful software, social engineering schemes and scams threaten to compromise the personal information and online safety of their clients. With cybercrime rates on the increase every year, it is important for businesses of all sizes to have a recovery plan in place to mitigate any losses. In the unfortunate event of a data breach, these are the steps you should take to recover.

Categories:

Tags:

(Read more…)

Read more