GDPR bustle: Even scammers have new privacy policy
Credit to Author: Tatyana Shcherbakova| Date: Tue, 29 May 2018 07:38:55 +0000
How scammers are exploiting the GDPR fuss to extract personal data.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Tatyana Shcherbakova| Date: Tue, 29 May 2018 07:38:55 +0000
How scammers are exploiting the GDPR fuss to extract personal data.
Read MoreCredit to Author: BrianKrebs| Date: Sat, 26 May 2018 16:18:48 +0000
The past month has seen one blockbuster revelation after another about how our mobile phone and broadband providers have been leaking highly sensitive customer information, including real-time location data and customer account details. In the wake of these consumer privacy debacles, many are left wondering who’s responsible for policing these industries? How exactly did we get to this point? What prospects are there for changes to address this national privacy crisis at the legislative and regulatory levels? These are some of the questions we’ll explore in this article.
Read MoreCredit to Author: Yaroslava Ryabova| Date: Fri, 25 May 2018 08:24:59 +0000
Advertising in voice assistants is coming soon. We examine how it will use personal data and what you can do about it.
Read MoreCredit to Author: Thomas Reed| Date: Tue, 22 May 2018 15:00:00 +0000
![]() | |
New Mac cryptominer malware is using the XMRig library to mine Monero on infected Macs. Categories: Tags: ApplecryptominercryptominingmacMac cryptominerXMRig |
The post New Mac cryptominer uses XMRig appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Thomas Reed| Date: Wed, 16 May 2018 15:00:00 +0000
![]() | |
iPhones have a reputation for being incredibly secure. However, using an iPhone is not an automatic guarantee of invulnerability. These seven tips will help make sure your iPhone is the digital fortress it was meant to be. Categories: Tags: AppleiOSiPhoneiphone securitymobile phone security |
The post Seven security tips for staying safe on an iPhone appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Christopher Boyd| Date: Wed, 09 May 2018 17:00:54 +0000
![]() | |
We take a look at a new Netflix phish in circulation, using the time-honored trick of claiming the recipient is about to lose access unless they hand over some personal information. Categories: Tags: Appleemailemailsnetflixnetflix phishphishphishingscam |
The post Netflix phish claims your membership is on hold appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Trend Micro| Date: Tue, 24 Apr 2018 18:26:56 +0000
The latest version of the macOS operating system, macOS High Sierra, was released on Monday, September 25, 2017. In this article, we will explain how to upgrade mac to macOS High Sierra. Why Should We Upgrade to macOS High Sierra? Apple released the latest macOS, High Sierra, and added some new features including…
The post How to Upgrade Mac to macOS High Sierra appeared first on .
Read MoreCredit to Author: Malwarebytes Labs| Date: Mon, 19 Mar 2018 17:30:00 +0000
![]() | |
Apple adds a new page to their website, aiming to address the growing trend of smartphone addiction in children and its harmful effects on users. Categories: Tags: Appleparental controlssecurity 101smartphone addictionteen security |
The post Investors concerned about smartphone addiction; Apple responds with new webpage appeared first on Malwarebytes Labs.
Read More