Stop telephoning me-eh-eh-eh-eh: robocalls explained

Credit to Author: Jovi Umawing| Date: Thu, 01 Feb 2018 19:11:47 +0000

The Federal Communications Commission (FCC) has identified robocalls as the number one complaint from the public. In this post, we tell you what you need to know to protect against the nasty ones.

Categories:

Tags:

(Read more…)

The post Stop telephoning me-eh-eh-eh-eh: robocalls explained appeared first on Malwarebytes Labs.

Read more

Cybersecurity New Year’s resolutions, you say? Why not.

Credit to Author: Jovi Umawing| Date: Fri, 19 Jan 2018 16:00:00 +0000

It’s no surprise that our resolutions are usually about health, finances, relationships, and self-improvement. As all of us live digital lives, too, why not think up cybersecurity New Year’s resolution that concern our online health and safety?

Categories:

Tags:

(Read more…)

The post Cybersecurity New Year’s resolutions, you say? Why not. appeared first on Malwarebytes Labs.

Read more

A state of constant uncertainty or uncertain constancy? Fast flux explained

Credit to Author: Malwarebytes Labs| Date: Tue, 12 Dec 2017 16:00:00 +0000

Although often seen as an illegal cybercriminal tactic, the methodology behind fast flux is actually far from evil. So how is it being abused? Read on to learn more.

Categories:

Tags:

(Read more…)

The post A state of constant uncertainty or uncertain constancy? Fast flux explained appeared first on Malwarebytes Labs.

Read more

Explained: the cloud

Credit to Author: Pieter Arntz| Date: Tue, 14 Nov 2017 18:24:53 +0000

The cloud. What is it? What are the pros and cons, and how can we make it as safe as possible? This post covers the basics.

Categories:

Tags:

(Read more…)

The post Explained: the cloud appeared first on Malwarebytes Labs.

Read more

Explained: blockchain technology

Credit to Author: Pieter Arntz| Date: Mon, 06 Nov 2017 17:45:49 +0000

Continuing education about cryptocurrency, we provide some insight into the technology behind blockchain and explain what makes it secure.

Categories:

Tags:

(Read more…)

The post Explained: blockchain technology appeared first on Malwarebytes Labs.

Read more

What is cryptocurrency and why do cybercriminals love it?

Credit to Author: Wendy Zamora| Date: Fri, 03 Nov 2017 14:00:49 +0000

Ever stumble into a conversation about Bitcoin and wonder, “What is cryptocurrency, anyway?” Read on to learn how it works and why cybercriminals love it.

Categories:

Tags:

(Read more…)

The post What is cryptocurrency and why do cybercriminals love it? appeared first on Malwarebytes Labs.

Read more

Our computers, ourselves: digital vs. biological security

Credit to Author: Chris Fistonich| Date: Wed, 25 Oct 2017 23:12:05 +0000

People often wonder how computer and biological viruses are the same. We compare the two, and what our computers and bodies do to fight them—it’s digital vs. biological security.

Categories:

Tags:

(Read more…)

The post Our computers, ourselves: digital vs. biological security appeared first on Malwarebytes Labs.

Read more

When cybersecurity isn’t all cyber: What does it really take to work in cybersecurity?

Credit to Author: Malwarebytes Labs| Date: Wed, 25 Oct 2017 20:29:25 +0000

Although lucrative and future-proof, being part of the cybersecurity workforce doesn’t just require one to be knowledgeable about code, network topologies, or social engineering tactics. People are still the most critical part of a business’s security process.

Categories:

Tags:

(Read more…)

The post When cybersecurity isn’t all cyber: What does it really take to work in cybersecurity? appeared first on Malwarebytes Labs.

Read more

How to create an intentional culture of security

Credit to Author: Malwarebytes Labs| Date: Thu, 19 Oct 2017 18:00:48 +0000

A culture of security in the workplace has always existed; it just may be unrecognized, weak, or inconsistent. How can businesses get employees to accept and champion an intentional culture of security? And why should they? We’ll show you how.

Categories:

Tags:

(Read more…)

The post How to create an intentional culture of security appeared first on Malwarebytes Labs.

Read more

Release the KRACKen: flaw in Wi-Fi security leaves users vulnerable

Credit to Author: Jean Taggart| Date: Tue, 17 Oct 2017 16:44:37 +0000

A serious flaw in the wireless protocol that secures all modern protected Wi-Fi networks has been discovered. If your device supports Wi-Fi, it is most likely affected. This feasible attack, dubbed KRACK, could abuse design or implementation flaws in the Wi-Fi standard, not some specific hardware. 

Categories:

Tags:

(Read more…)

The post Release the KRACKen: flaw in Wi-Fi security leaves users vulnerable appeared first on Malwarebytes Labs.

Read more

Make way for the GDPR: Is your business ready?

Credit to Author: Malwarebytes Labs| Date: Tue, 10 Oct 2017 17:13:16 +0000

On May 25th, 2018, the EU General Data Protection Regulation (GDPR) will come into full force. Although this law applies to data controllers and data processors within the European Union, SMEs in the US and other countries that handle online data of Europe and UK citizens are affected by this as well. Thus, there is a need for companies to comply. Where should B2Cs and B2Bs start? Read through our comprehensive guide here.

Categories:

Tags:

(Read more…)

The post Make way for the GDPR: Is your business ready? appeared first on Malwarebytes Labs.

Read more