Explained: like-farming

Credit to Author: Pieter Arntz| Date: Thu, 18 Apr 2019 15:00:00 +0000

Like-farming is a popular method on social media to harvest as many likes and shares as possible in order to increase the value of a site or domain. But what happens when scammers get in the game?

Categories:

Tags:

(Read more…)

The post Explained: like-farming appeared first on Malwarebytes Labs.

Read more

Reputation management in the age of cyberattacks against businesses

Credit to Author: Jovi Umawing| Date: Thu, 14 Mar 2019 16:15:59 +0000

A business’s reputation takes years to build. With the current climate of data breaches, unsurprisingly, destroying it could only take seconds. What can businesses do to protect their brands from a fallout following a cybersecurity incident? In this post, we answer these questions and more.

Categories:

Tags:

(Read more…)

The post Reputation management in the age of cyberattacks against businesses appeared first on Malwarebytes Labs.

Read more

Google Chrome announces plans to improve URL display, website identity

Credit to Author: Malwarebytes Labs| Date: Wed, 06 Feb 2019 18:16:47 +0000

The search giant isn’t “killing” (a.k.a. getting rid of) the URL, unlike some sensationalist and eye-rolling headlines have put it. They are slowly giving it a facelift.

Categories:

Tags:

(Read more…)

The post Google Chrome announces plans to improve URL display, website identity appeared first on Malwarebytes Labs.

Read more

How to browse the Internet safely at work

Credit to Author: Jovi Umawing| Date: Tue, 05 Feb 2019 16:00:44 +0000

This Safer Internet Day, we’re presenting a guideline to employees on how to navigate the online trenches safely, whether they’re on their desktop computers, company-owned laptops, or mobile devices. Who wants to be the one responsible for a breach? No one.

Categories:

Tags:

(Read more…)

The post How to browse the Internet safely at work appeared first on Malwarebytes Labs.

Read more

Interview with a malware hunter: Jérôme Segura

Credit to Author: Pieter Arntz| Date: Tue, 29 Jan 2019 16:00:00 +0000

In our series called “Interview with a malware hunter,” we turn to Jerome Segura, Head of Threat Intelligence at Malwarebytes. In this Q&A session, we’ll take you behind the scenes to get to know one of our malware intelligence crew.

Categories:

Tags:

(Read more…)

The post Interview with a malware hunter: Jérôme Segura appeared first on Malwarebytes Labs.

Read more

Yes, Chromebooks can and do get infected

Credit to Author: Thomas Reed| Date: Wed, 19 Dec 2018 15:00:57 +0000

We’ve heard people say Macs don’t get viruses for years, but we know that to be false. But what about Chromebooks? They’re totally safe, right? Think again.

Categories:

Tags:

(Read more…)

The post Yes, Chromebooks can and do get infected appeared first on Malwarebytes Labs.

Read more

All the reasons why cybercriminals want to hack your phone

Credit to Author: Kayla Matthews| Date: Tue, 18 Dec 2018 16:00:00 +0000

Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn’t they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.

Categories:

Tags:

(Read more…)

The post All the reasons why cybercriminals want to hack your phone appeared first on Malwarebytes Labs.

Read more

Marriott breach impacts 500 million customers: here’s what to do about it

Credit to Author: Malwarebytes Labs| Date: Fri, 30 Nov 2018 19:17:33 +0000

Marriott disclosed a large-scale data breach impacting up to 500 million customers who have stayed at a Starwood-branded hotel within the last four years.

Categories:

Tags:

(Read more…)

The post Marriott breach impacts 500 million customers: here’s what to do about it appeared first on Malwarebytes Labs.

Read more

My precious: security, privacy, and smart jewelry

Credit to Author: Jovi Umawing| Date: Wed, 14 Nov 2018 17:27:23 +0000

Fashionable and functional. These are the makings of smart jewelry. They aren’t secure, yet some are used to secure user data and online accounts. Should you still buy one?

Categories:

Tags:

(Read more…)

The post My precious: security, privacy, and smart jewelry appeared first on Malwarebytes Labs.

Read more

Sextortion emails: They’re probably not watching you

Credit to Author: William Tsing| Date: Thu, 25 Oct 2018 15:00:00 +0000

Yes, those sextortion email scams using old passwords are still making the rounds. How can you spot a real sextortion attempt from an empty threat? And when should you report to authorities? Read on to find out.

Categories:

Tags:

(Read more…)

The post Sextortion emails: They’re probably not watching you appeared first on Malwarebytes Labs.

Read more