5 safe ways to get back at spammers: a guide to wasting time

Credit to Author: Christopher Boyd| Date: Tue, 11 Sep 2018 15:00:00 +0000

We take a look at some of the safe ways to waste a spammer’s time, whether by email or telephone.

Categories:

Tags:

(Read more…)

The post 5 safe ways to get back at spammers: a guide to wasting time appeared first on Malwarebytes Labs.

Read more

How to block ads like a pro

Credit to Author: Adam McNeil| Date: Thu, 19 Jul 2018 17:24:34 +0000

In part one of this series, we had a look at a few reasons why you should block ads on your network and devices. In the second part, we’ll cover a few of the common ad blocking utilities and how to best configure those tools for maximum effectiveness.

Categories:

Tags:

(Read more…)

The post How to block ads like a pro appeared first on Malwarebytes Labs.

Read more

So you’ve been asked to start a threat intel program

Credit to Author: William Tsing| Date: Tue, 10 Jul 2018 15:00:00 +0000

What are the bumps in the road you can expect and avoid when setting up a threat intel progarm for your business?

Categories:

Tags:

(Read more…)

The post So you’ve been asked to start a threat intel program appeared first on Malwarebytes Labs.

Read more

Internet Safety Month: How to manage your child’s online presence

Credit to Author: Jovi Umawing| Date: Thu, 28 Jun 2018 15:32:14 +0000

Parents with good intentions may not realize that by sharing photos of their children on social media, they have already created their online presence. The good news is that their online reputation can be managed, and you can teach them how to do it, too. 

Categories:

Tags:

(Read more…)

The post Internet Safety Month: How to manage your child’s online presence appeared first on Malwarebytes Labs.

Read more

Five easy ways to recognize and dispose of malicious emails

Credit to Author: Pieter Arntz| Date: Tue, 19 Jun 2018 15:00:00 +0000

What should you check for to determine if an email is spam or malicious? Here are five red flags to look for—and what to do with those malicious emails when you find them.

Categories:

Tags:

(Read more…)

The post Five easy ways to recognize and dispose of malicious emails appeared first on Malwarebytes Labs.

Read more

Where did the tech support scam blacklist go?

Credit to Author: William Tsing| Date: Fri, 11 May 2018 15:00:00 +0000

We’ve removed our blacklist of recognized tech support scammers from our tech scam support page. Here’s what we’re doing instead.

Categories:

Tags:

(Read more…)

The post Where did the tech support scam blacklist go? appeared first on Malwarebytes Labs.

Read more

Keeping your business and personal instant messages secure

Credit to Author: Christopher Boyd| Date: Wed, 11 Apr 2018 15:00:00 +0000

Most people want to know their instant messages are securely wrapped up—whether that’s for personal privacy or protecting business communications. There are a lot of solutions out there for better securing IMs.

Categories:

Tags:

(Read more…)

The post Keeping your business and personal instant messages secure appeared first on Malwarebytes Labs.

Read more

You down with P2P? 10 tips to secure your mobile payment app

Credit to Author: Jovi Umawing| Date: Fri, 30 Mar 2018 16:00:00 +0000

Peer-to-peer (P2P) mobile transactions are on the rise, thanks to a number of mobile payment apps available on the market. In this post, we’ll look at the security risks of using P2P payment apps and what users can do to protect themselves.

Categories:

Tags:

(Read more…)

The post You down with P2P? 10 tips to secure your mobile payment app appeared first on Malwarebytes Labs.

Read more

10 ways to protect your Android phone

Credit to Author: Jovi Umawing| Date: Wed, 28 Mar 2018 15:00:00 +0000

How can Android users balance the power of better tech with the safety of best cybersecurity practices? Here are a few tried and true methods to protect your Android phone.

Categories:

Tags:

(Read more…)

The post 10 ways to protect your Android phone appeared first on Malwarebytes Labs.

Read more

How to protect your computer from malicious cryptomining

Credit to Author: Pieter Arntz| Date: Tue, 27 Feb 2018 17:30:00 +0000

When you experience a slow computer due to malicious cryptomining, how can you troubleshoot it and prevent it from happening again?

Categories:

Tags:

(Read more…)

The post How to protect your computer from malicious cryptomining appeared first on Malwarebytes Labs.

Read more