The danger of third parties: ads, pipelines, and plugins

Credit to Author: Christopher Boyd| Date: Fri, 20 Jul 2018 15:00:00 +0000

We take a look at the perils of the tools and services embedded into the websites you use on a daily basis, thanks to the development help of third parties.

Categories:

Tags:

(Read more…)

The post The danger of third parties: ads, pipelines, and plugins appeared first on Malwarebytes Labs.

Read more

A primer: How to stay safe on Amazon Prime Day

Credit to Author: Jovi Umawing| Date: Sun, 15 Jul 2018 17:34:53 +0000

While Amazon is poised for its fourth annual Prime Day, the e-commerce giant’s flash sales event for Prime members, shoppers on the hunt for deals may get more than they bargained for—malware. Here’s what you need to keep in mind to stay secure while you shop.

Categories:

Tags:

(Read more…)

The post A primer: How to stay safe on Amazon Prime Day appeared first on Malwarebytes Labs.

Read more

A primer: How to stay safe on Amazon’s Prime Day Sale

Credit to Author: Jovi Umawing| Date: Sun, 15 Jul 2018 17:34:53 +0000

While Amazon is poised for its fourth year run of Prime Day, the e-commerce giant’s annual flash sales event for Prime members, shoppers on the hunt for bargain deals are ready and revving, too. But before you review your shopping list, let us first review some points we need to keep in mind to stay secure whilst we shop.

Categories:

Tags:

(Read more…)

The post A primer: How to stay safe on Amazon’s Prime Day Sale appeared first on Malwarebytes Labs.

Read more

When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained

Credit to Author: Jovi Umawing| Date: Thu, 12 Jul 2018 16:42:06 +0000

Maybe it’s the quirky way some tech writers abbreviate it, or the surreal way it reminded you of that popular Michael Jackson song. Whatever triggers you to remember the term, for most of us, man-in-the-middle embodies something both familiar yet mysterious. Let’s get to know this threat a little bit better, shall we?

Categories:

Tags:

(Read more…)

The post When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained appeared first on Malwarebytes Labs.

Read more

So you’ve been asked to start a threat intel program

Credit to Author: William Tsing| Date: Tue, 10 Jul 2018 15:00:00 +0000

What are the bumps in the road you can expect and avoid when setting up a threat intel progarm for your business?

Categories:

Tags:

(Read more…)

The post So you’ve been asked to start a threat intel program appeared first on Malwarebytes Labs.

Read more

Internet Safety Month: How to manage your child’s online presence

Credit to Author: Jovi Umawing| Date: Thu, 28 Jun 2018 15:32:14 +0000

Parents with good intentions may not realize that by sharing photos of their children on social media, they have already created their online presence. The good news is that their online reputation can be managed, and you can teach them how to do it, too. 

Categories:

Tags:

(Read more…)

The post Internet Safety Month: How to manage your child’s online presence appeared first on Malwarebytes Labs.

Read more

Did my comment on your blog get lost?

Credit to Author: Pieter Arntz| Date: Mon, 25 Jun 2018 17:00:00 +0000

Automatic filters on our blog sometimes catch benign comments by accident. However, they also protect users from spammers, scammers, and malicious links. Read on to learn about our comment policy: what we block and why.

Categories:

Tags:

(Read more…)

The post Did my comment on your blog get lost? appeared first on Malwarebytes Labs.

Read more

Five easy ways to recognize and dispose of malicious emails

Credit to Author: Pieter Arntz| Date: Tue, 19 Jun 2018 15:00:00 +0000

What should you check for to determine if an email is spam or malicious? Here are five red flags to look for—and what to do with those malicious emails when you find them.

Categories:

Tags:

(Read more…)

The post Five easy ways to recognize and dispose of malicious emails appeared first on Malwarebytes Labs.

Read more

Internet Safety Month: How to protect your child’s privacy online

Credit to Author: Jovi Umawing| Date: Tue, 12 Jun 2018 17:44:48 +0000

This month is Internet Safety Month, and today we’ll be talking about online privacy for children. For parents and caretakers, nothing could be more troubling than the thought of having your child’s personal information stolen and used by nefarious actors. In part one of this two-part series, we’ll discuss how parents can help kids and teens protect their online presence.

Categories:

Tags:

(Read more…)

The post Internet Safety Month: How to protect your child’s privacy online appeared first on Malwarebytes Labs.

Read more

Why bad coding habits die hard—and 7 ways to kill them

Credit to Author: Jovi Umawing| Date: Wed, 23 May 2018 15:00:00 +0000

When it comes to poorly-written code, we’re quick to point a finger at programmers, forgetting that they are beholden to the constraints of companies looking to push out tech product quickly. Thankfully, management can address bad coding habits with these seven ways to support, train, and motivate their staff.

Categories:

Tags:

(Read more…)

The post Why bad coding habits die hard—and 7 ways to kill them appeared first on Malwarebytes Labs.

Read more

Why tech companies wanted Senate Bill 315 vetoed

Credit to Author: Kayla Matthews| Date: Fri, 18 May 2018 16:00:38 +0000

Georgia Senate Bill 315 aimed to make all unauthorized access to computers illegal—sounds good, right? Read why provisions in its fine print made tech and security companies more than uncomfortable.

Categories:

Tags:

(Read more…)

The post Why tech companies wanted Senate Bill 315 vetoed appeared first on Malwarebytes Labs.

Read more