Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack

Credit to Author: Sam Chester| Date: Fri, 14 Feb 2020 17:32:10 +0000

We take a look at some of the most famous (or infamous) hacking scenes from TV and movies and the cybersecurity lessons, if any, we can learn from them.

Categories:

Tags:

(Read more…)

The post Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack appeared first on Malwarebytes Labs.

Read more

A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s

Credit to Author: Malwarebytes Labs| Date: Thu, 19 Dec 2019 18:03:33 +0000

As the 2010s come to a close, we take a snarky walk down memory lane, listing the craziest, most impactful, or simply just awful cybersecurity fails of the decade.

Categories:

Tags:

(Read more…)

The post A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s appeared first on Malwarebytes Labs.

Read more

Report: Organizations remain vulnerable to increasing insider threats

Credit to Author: Jovi Umawing| Date: Thu, 05 Dec 2019 16:00:00 +0000

The risk and challenges insider threats pose to organizations are ever present, even before tech as we know it existed. The age of digitization only made it higher and far-reaching. How has insider threats evolved over time? Where are we now in terms of mitigating insider threat risk? Are businesses really doing something about it? We answer such questions—and more—in this post.

Categories:

Tags:

(Read more…)

The post Report: Organizations remain vulnerable to increasing insider threats appeared first on Malwarebytes Labs.

Read more

As Internet turns 50, more risks and possibilities emerge

Credit to Author: Akshay Bhargava| Date: Tue, 29 Oct 2019 15:00:00 +0000

The world as we know it changed on October 29, 1969, the day the Internet was born. 50 years later, it’s both ubiquitous and full of potential—and risks.

Categories:

Tags:

(Read more…)

The post As Internet turns 50, more risks and possibilities emerge appeared first on Malwarebytes Labs.

Read more

When can we get rid of passwords for good?

Credit to Author: Pieter Arntz| Date: Wed, 16 Oct 2019 20:17:19 +0000

Passwords are a burden and security risk, especially when used as a single authentication method. Can we get rid of passwords once and for all? We list alternative authentication methods and discuss their pros and cons.

Categories:

Tags:

(Read more…)

The post When can we get rid of passwords for good? appeared first on Malwarebytes Labs.

Read more

Europol: Ransomware remains top threat in IOCTA report

Credit to Author: Malwarebytes Labs| Date: Mon, 14 Oct 2019 16:00:00 +0000

The European Union Agency for Law Enforcement Cooperation, or Europol, just released its annual Internet Organized Crime Threat Assessment (IOCTA) report. We highlight their key findings and remind readers how to better protect themselves.

Categories:

Tags:

(Read more…)

The post Europol: Ransomware remains top threat in IOCTA report appeared first on Malwarebytes Labs.

Read more

Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks

Credit to Author: Jovi Umawing| Date: Wed, 21 Aug 2019 15:56:45 +0000

Researchers called it KNOB, a clever attack against the firmware of a Bluetooth chip that can allow hackers to successfully hijack paired devices and steal their sensitive data. Are users at risk?

Categories:

Tags:

(Read more…)

The post Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks appeared first on Malwarebytes Labs.

Read more