My precious: security, privacy, and smart jewelry

Credit to Author: Jovi Umawing| Date: Wed, 14 Nov 2018 17:27:23 +0000

Fashionable and functional. These are the makings of smart jewelry. They aren’t secure, yet some are used to secure user data and online accounts. Should you still buy one?

Categories:

Tags:

(Read more…)

The post My precious: security, privacy, and smart jewelry appeared first on Malwarebytes Labs.

Read more

Sextortion emails: They’re probably not watching you

Credit to Author: William Tsing| Date: Thu, 25 Oct 2018 15:00:00 +0000

Yes, those sextortion email scams using old passwords are still making the rounds. How can you spot a real sextortion attempt from an empty threat? And when should you report to authorities? Read on to find out.

Categories:

Tags:

(Read more…)

The post Sextortion emails: They’re probably not watching you appeared first on Malwarebytes Labs.

Read more

Malwarebytes is a champion of National Cybersecurity Awareness Month

Credit to Author: Jovi Umawing| Date: Mon, 01 Oct 2018 14:00:31 +0000

As we bid hello to National Cybersecurity Awareness Month, we at Malwarebytes not only pledge to provide the best protection for our customers. We also re-commit ourselves to fostering cybersecurity education and awareness for all.

Categories:

Tags:

(Read more…)

The post Malwarebytes is a champion of National Cybersecurity Awareness Month appeared first on Malwarebytes Labs.

Read more

Malwarebytes is a champion of National Cyber Security Awareness Month

Credit to Author: Jovi Umawing| Date: Mon, 01 Oct 2018 14:00:31 +0000

As we bid hello to National Cyber Security Awareness Month, we at Malwarebytes not only pledge to provide the best protection for our customers. We also re-commit ourselves to fostering cybersecurity education and awareness for all.

Categories:

Tags:

(Read more…)

The post Malwarebytes is a champion of National Cyber Security Awareness Month appeared first on Malwarebytes Labs.

Read more

Phone spampocalypse: fighting back in the age of unwanted calls

Credit to Author: Jovi Umawing| Date: Thu, 27 Sep 2018 18:58:27 +0000

US telecommunications companies have the technology to protect customers against the rising tide of unwanted calls—they just haven’t done it yet. So it’s up to lawmakers and consumers themselves to fight back against phone spampocalypse. Here’s how they’re doing it.

Categories:

Tags:

(Read more…)

The post Phone spampocalypse: fighting back in the age of unwanted calls appeared first on Malwarebytes Labs.

Read more

6 sure signs someone is phishing you—besides email

Credit to Author: Kayla Matthews| Date: Thu, 20 Sep 2018 16:00:00 +0000

Beyond the medium used to reach you (which is most often email), what are some of the common signs and behaviors of phishing? Conversations that focus on the inbox only leave users with an inadequate understanding of how to protect against this ubiquitous threat.

Categories:

Tags:

(Read more…)

The post 6 sure signs someone is phishing you—besides email appeared first on Malwarebytes Labs.

Read more

When spyware goes mainstream

Credit to Author: Malwarebytes Labs| Date: Wed, 05 Sep 2018 15:00:00 +0000

Considering using spyware to surveil a cheating partner or keep an eye on the kiddos? Think again. Not only is it an invasion of privacy, but it’s illegal. Learn the telltale signs of spyware and why this suddenly mainstream malware needs to go back underground.

Categories:

Tags:

(Read more…)

The post When spyware goes mainstream appeared first on Malwarebytes Labs.

Read more

Back to school cybersecurity: hints, tips, and links for a safer school year

Credit to Author: Malwarebytes Labs| Date: Tue, 14 Aug 2018 15:00:00 +0000

Term time is upon us once more, and soon the summer holidays will be a thing of the past. We offer up some handy hints and tips for better back to school cybersecurity, and link to numerous resources of our own to help parents and kids have a safer online experience this year.

Categories:

Tags:

(Read more…)

The post Back to school cybersecurity: hints, tips, and links for a safer school year appeared first on Malwarebytes Labs.

Read more

8 everyday technologies that can make you vulnerable to cyberattacks

Credit to Author: Kayla Matthews| Date: Thu, 09 Aug 2018 15:00:00 +0000

The security vulnerabilities of the latest developments in tech have been well documented. But what about everyday technologies that have been around for a while or are widely adopted? Here are eight commonly-used tech conveniences that are not as ironclad as you might hope.

Categories:

Tags:

(Read more…)

The post 8 everyday technologies that can make you vulnerable to cyberattacks appeared first on Malwarebytes Labs.

Read more

The danger of third parties: ads, pipelines, and plugins

Credit to Author: Christopher Boyd| Date: Fri, 20 Jul 2018 15:00:00 +0000

We take a look at the perils of the tools and services embedded into the websites you use on a daily basis, thanks to the development help of third parties.

Categories:

Tags:

(Read more…)

The post The danger of third parties: ads, pipelines, and plugins appeared first on Malwarebytes Labs.

Read more