security things in Linux v4.18
Previously:v4.17. linux kernel v4.18 was released last week . Here are details on some of the security things I found interesting: allocation overflow detection helpers One of the many ways C can be...
View ArticleIf you’re still using a fax machine for ‘security’ think again
At this year's Def Con, Check Point researchers Yaniv Balmas and Eyal Itkin unveiled how they infiltrated the HP Officejet Pro 6830 all-in-one printer/copier/fax (it was the cheapest). It's important...
View ArticleDon't Be So Sure AI Is Cybersecurity's Silver Bullet
There's a lot of hype around artificial intelligence as the greatest thing since sliced bread, but will AI really help with cybersecurity? Criminals who run cybercriminal businesses also are capable of...
View ArticleWhat Happens If Dashlane Gets Hacked? Your Master Password Keeps You Safe
At Dashlane, we talk a lot about the importance of using unique, complex passwords to protect your accounts. This is especially true when it comes to constructing your Master Password, which protects...
View ArticleSecuring The Server, Inside And Out
Computing is hard enough, but the sophistication and proliferation of attacks on IT infrastructure, from the firewall moat surrounding the corporate network all the way down into the guts of the...
View ArticleDispelling the Myths Surrounding Security Technology and GDPR
Many of our customers conducting business in Europe are concerned about how the new General Data Protection Regulation (“GDPR”) impacts the ability to protect their organization’s data, network and IT...
View ArticleProviding a More Complete Security Infrastructure
Cloudspace USA is in the business of selling infrastructure-as-a-service to small and medium businesses. Cloudspace provides its customers with a managed network comprised of everything you need to...
View ArticleDefinitive VMworld 2018 Guide for Micro-Segmentation Practitioners
As you plan to attend VMworld 2018 Do you have questions like : how do I micro-segment? What grouping strategies do I use? How to do a Firewall-As-A-Service in hybrid VM and Container environments? Or...
View ArticleVMworld 2018 vSphere Security Sessions
It’s that time of year again! The time when we all pack our comfortable shoes and head to Las Vegas for VMworld! As we are all dealing with the seemingly ever-increasing IT security issues that plague...
View ArticleRemove My Get Daily Bible Verses Redirect and Restore Your Browser
The Get Daily Bible Verses redirect is a browser-based threat which can infect target hosts based using a variety of different tactics. Depending on the scope of the targets the criminal operators can...
View ArticleRemove Pdf2docpro.com Redirect
Pdf2docpro.commight be distributed by using different methods. One of those methods is through third-party installations. Those installer setups come from bundled applications and freeware that could...
View ArticleInfineon enables open source software stack for TPM 2.0 for easier integratio...
Munich, Germany 16 August 2018 Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) has enabled a new open source software stack. It makes work easier for developers who want to use the Trusted Platform...
View ArticleWatch that browser add-on
This is a story about how hard it is for normal folks to keep their computers secure. It is a depressing but instructive one. Most of us take for granted that when we bring up our web browser and go to...
View ArticleIntroducing Cloud HSM beta for hardware crypto key security
Data protection is a top consideration when running enterprise workloads in the cloud. At Google Cloud Platform (GCP), we offer numerous options to encrypt your data, including our default...
View ArticleThe enemy is us: a look at insider threats
They can go undetected for years. They do their questionable deeds in the background. And, at times, one wonders if they’re doing more harm than good. Although this sounds like we’re describing some...
View ArticleRiding the Wave Alert Logic Recognized as a Leader in Global MSSPs
Forrester just released The Forrester Wave: Global Managed Security Services Providers (MSSPs), Q3 2018. Forrester analysts spent months evaluating 14 global managed security services...
View ArticleNew outcry over Trump's revocation of Brennan security clearance
FILE PHOTO: Former CIA director John Brennan is sworn in to testify before the House Intelligence Committee to take questions on "Russian active measures during the 2016 election campaign" on Capitol...
View ArticleA week in security (August 13 19)
Last week on Malwarebytes Labs, we talked about how Process Doppelgnging meets Process Hollowing in the Osiris dropper , provided hints, tips, and links for a safer school year , gave a recap of Black...
View ArticleHTTPS security best practices
The #1 HTTPS tip The single most important tip regarding HTTPS is to use it. It really should be a no-brainer, and as browsers (and search engines!) are moving to discriminate non-encrypted websites,...
View ArticleSingle point of failure
Yesterday[1], Gatwick Airport suffered a catastrophic failure. It wasn’t Air Traffic Control, it wasn’t security scanners, it wasn’t even check-in desk software, but the flight information boards....
View Article