Why is Malwarebytes blocking CoinHive?

Since September 19, the number two most frequently blocked website for our customers has been coinhive.com. This post will describe what CoinHive is, what it is doing, and why we are blocking it.

Categories:

Tags:

(Read more…)

The post Why is Malwarebytes blocking CoinHive? appeared first on Malwarebytes Labs.

The post Why is Malwarebytes blocking CoinHive? appeared first on Security Boulevard.

from Why is Malwarebytes blocking CoinHive?

Advertisements

How Do I Protect Against Ransomware?

Guest column by Joseph Carson, Chief Security Scientist at Thycotic. “Ransomware” is on the rise using “targeted phishing attacks” and is being used for financial blackmail and poison or corrupt data. No one is excluded from these threats and no company or individual is too small to be a target. Ransomware has become such a … Continue reading How Do I Protect Against Ransomware?

The post How Do I Protect Against Ransomware? appeared first on Semperis.

The post How Do I Protect Against Ransomware? appeared first on Security Boulevard.

from How Do I Protect Against Ransomware?

Email Sender Domain: How to Spot a Phish Video

In observance of National Cyber Security Awareness month, we are releasing several videos to help employees and consumers spot a phish. In the second video, we take a look at the  sender’s email address to help spot a potentially malicious email. To view all videos released in this series, visit this page: https://info.phishlabs.com/2017-cyber-security-awareness-month

The post Email Sender Domain: How to Spot a Phish Video appeared first on Security Boulevard.

from Email Sender Domain: How to Spot a Phish Video

Active Directory®as a Service & macOS Authentication

There are two issues that many IT organizations are trying to solve when it comes to identity management. One is that they would like to move all of their IT…

The post Active Directory®as a Service & macOS Authentication appeared first on JumpCloud.

The post Active Directory®as a Service & macOS Authentication appeared first on Security Boulevard.

from Active Directory®as a Service & macOS Authentication

SSD Advisory – Endian Firewall Stored From XSS to Remote Command Execution

Vulnerability Summary The following advisory describes a stored cross site scripting that can be used to trigger remote code execution in Endian Firewall version 5.0.3. Endian Firewall is a “turnkey Linux security distribution, which is an independent, unified security management operating system. The Endian Firewall is based on a hardened Linux operating system.” Credit An … Continue reading SSD Advisory – Endian Firewall Stored From XSS to Remote Command Execution

The post SSD Advisory – Endian Firewall Stored From XSS to Remote Command Execution appeared first on Security Boulevard.

from SSD Advisory – Endian Firewall Stored From XSS to Remote Command Execution

Old Technologies Enable Future Secure Application Delivery Networking

Many years ago, one of my customers had an internet-facing application. They positioned load balancers in front of the application to support the growing traffic load. Traffic to the website was growing so fast, that parts of the network infrastructure could not support the customer load. One of the first components to fail under the […]

The post Old Technologies Enable Future Secure Application Delivery Networking appeared first on Radware Blog.

The post Old Technologies Enable Future Secure Application Delivery Networking appeared first on Security Boulevard.

from Old Technologies Enable Future Secure Application Delivery Networking

Top Linux Certifications [2017]

Linux is the central OS for most IT infrastructures throughout the world, so chances are your IT career will require you to leverage some Linux skills. If you are trying to step up your Linux game this year, then here are the top Linux certifications you should be adding to your resume. Top Certifications For […]

The post Top Linux Certifications [2017] appeared first on Phoenix TS.

The post Top Linux Certifications [2017] appeared first on Security Boulevard.

from Top Linux Certifications [2017]

Checkmarx Expands Codebashing Developer Application Security Training With New Interactive Mobile Security Courses

SAN FRANCISCO–(BUSINESS WIRE)–Checkmarx, a global leader in application security testing solutions, today announced it is launching new mobile security courses for […]

The post Checkmarx Expands Codebashing Developer Application Security Training With New Interactive Mobile Security Courses appeared first on Checkmarx.

The post Checkmarx Expands Codebashing Developer Application Security Training With New Interactive Mobile Security Courses appeared first on Security Boulevard.

from Checkmarx Expands Codebashing Developer Application Security Training With New Interactive Mobile Security Courses

Lightboard Lessons: What are Bots?

In this Lightboard Lesson, I light up some #basics about internet bots and botnets. Humans account for less than 50% of internet traffic and the rest is spread between the good bots and bad ones. ps Related: The Facts about Botnets The state of botnets in late 2015 and early 2016 What are bots? Advertisements

The post Lightboard Lessons: What are Bots? appeared first on Security Boulevard.

from Lightboard Lessons: What are Bots?