Explained: the cloud

Credit to Author: Pieter Arntz| Date: Tue, 14 Nov 2017 18:24:53 +0000

The cloud. What is it? What are the pros and cons, and how can we make it as safe as possible? This post covers the basics.

Categories:

Tags:

(Read more…)

The post Explained: the cloud appeared first on Malwarebytes Labs.

Read more

Explained: blockchain technology

Credit to Author: Pieter Arntz| Date: Mon, 06 Nov 2017 17:45:49 +0000

Continuing education about cryptocurrency, we provide some insight into the technology behind blockchain and explain what makes it secure.

Categories:

Tags:

(Read more…)

The post Explained: blockchain technology appeared first on Malwarebytes Labs.

Read more

What is cryptocurrency and why do cybercriminals love it?

Credit to Author: Wendy Zamora| Date: Fri, 03 Nov 2017 14:00:49 +0000

Ever stumble into a conversation about Bitcoin and wonder, “What is cryptocurrency, anyway?” Read on to learn how it works and why cybercriminals love it.

Categories:

Tags:

(Read more…)

The post What is cryptocurrency and why do cybercriminals love it? appeared first on Malwarebytes Labs.

Read more

Our computers, ourselves: digital vs. biological security

Credit to Author: Chris Fistonich| Date: Wed, 25 Oct 2017 23:12:05 +0000

People often wonder how computer and biological viruses are the same. We compare the two, and what our computers and bodies do to fight them—it’s digital vs. biological security.

Categories:

Tags:

(Read more…)

The post Our computers, ourselves: digital vs. biological security appeared first on Malwarebytes Labs.

Read more

When cybersecurity isn’t all cyber: What does it really take to work in cybersecurity?

Credit to Author: Malwarebytes Labs| Date: Wed, 25 Oct 2017 20:29:25 +0000

Although lucrative and future-proof, being part of the cybersecurity workforce doesn’t just require one to be knowledgeable about code, network topologies, or social engineering tactics. People are still the most critical part of a business’s security process.

Categories:

Tags:

(Read more…)

The post When cybersecurity isn’t all cyber: What does it really take to work in cybersecurity? appeared first on Malwarebytes Labs.

Read more

How to create an intentional culture of security

Credit to Author: Malwarebytes Labs| Date: Thu, 19 Oct 2017 18:00:48 +0000

A culture of security in the workplace has always existed; it just may be unrecognized, weak, or inconsistent. How can businesses get employees to accept and champion an intentional culture of security? And why should they? We’ll show you how.

Categories:

Tags:

(Read more…)

The post How to create an intentional culture of security appeared first on Malwarebytes Labs.

Read more

Release the KRACKen: flaw in Wi-Fi security leaves users vulnerable

Credit to Author: Jean Taggart| Date: Tue, 17 Oct 2017 16:44:37 +0000

A serious flaw in the wireless protocol that secures all modern protected Wi-Fi networks has been discovered. If your device supports Wi-Fi, it is most likely affected. This feasible attack, dubbed KRACK, could abuse design or implementation flaws in the Wi-Fi standard, not some specific hardware. 

Categories:

Tags:

(Read more…)

The post Release the KRACKen: flaw in Wi-Fi security leaves users vulnerable appeared first on Malwarebytes Labs.

Read more

Make way for the GDPR: Is your business ready?

Credit to Author: Malwarebytes Labs| Date: Tue, 10 Oct 2017 17:13:16 +0000

On May 25th, 2018, the EU General Data Protection Regulation (GDPR) will come into full force. Although this law applies to data controllers and data processors within the European Union, SMEs in the US and other countries that handle online data of Europe and UK citizens are affected by this as well. Thus, there is a need for companies to comply. Where should B2Cs and B2Bs start? Read through our comprehensive guide here.

Categories:

Tags:

(Read more…)

The post Make way for the GDPR: Is your business ready? appeared first on Malwarebytes Labs.

Read more

Out of character: Homograph attacks explained

Credit to Author: Malwarebytes Labs| Date: Fri, 06 Oct 2017 15:00:10 +0000

Online and on traditional media, we hear and read about different kinds of cybersecurity attacks that sometimes we get overwhelmed with the terminologies. Most of us grasp what phishing attacks and denial of service (DoS) attacks are, but how familiar are we wit

Categories:

Tags:

(Read more…)

The post Out of character: Homograph attacks explained appeared first on Malwarebytes Labs.

Read more

National cybersecurity awareness month: simple steps for online safety

Credit to Author: Wendy Zamora| Date: Mon, 02 Oct 2017 19:00:03 +0000

National cybersecurity awareness month was created to ensure that every American has the resources they need to stay safer and more secure online. And now Malwarebytes is doing its part.

Categories:

Tags:

(Read more…)

The post National cybersecurity awareness month: simple steps for online safety appeared first on Malwarebytes Labs.

Read more

Google reminds website owners to move to HTTPS before October deadline

Credit to Author: Malwarebytes Labs| Date: Thu, 07 Sep 2017 15:36:57 +0000

To encourage website owners and service providers to move to HTTPS, Google began sending out emails to remind them that their sites will be marked as insecure if they don’t comply. This is the latest step in the search giant’s long-term effort of creating a safer web experience for every user.

Categories:

Tags:

(Read more…)

The post Google reminds website owners to move to HTTPS before October deadline appeared first on Malwarebytes Labs.

Read more