Everything you need to know about ATM attacks and fraud: Part 1

Credit to Author: Jovi Umawing| Date: Wed, 29 May 2019 15:00:00 +0000

If you’re familiar with skimming, you may have also heard of shimming, card trapping, and cash trapping. These are attacks and scams targeted at ATMs. Part 1 of our series explores various ATM attack scenarios and explains what users should look out for when using an ATM.

Categories:

Tags:

(Read more…)

The post Everything you need to know about ATM attacks and fraud: Part 1 appeared first on Malwarebytes Labs.

Read more

Employee education strategies that work to change behavior

Credit to Author: Kacy Zurkus| Date: Tue, 28 May 2019 15:25:52 +0000

Using technology alone to combat cyberattacks is not enough. That’s why employee education on security awareness should be an integral part of any company’s cybersecurity policy.

Categories:

Tags:

(Read more…)

The post Employee education strategies that work to change behavior appeared first on Malwarebytes Labs.

Read more

The lazy person’s guide to cybersecurity: minimum effort for maximum protection

Credit to Author: Pieter Arntz| Date: Thu, 21 Feb 2019 17:00:00 +0000

How can we help our less tech-savvy friends stay more secure online? By giving them a lazy person’s guide to cybersecurity, we can offer maximum protection for minimal effort.

Categories:

Tags:

(Read more…)

The post The lazy person’s guide to cybersecurity: minimum effort for maximum protection appeared first on Malwarebytes Labs.

Read more

Should you delete yourself from social media?

Credit to Author: Jean Taggart| Date: Thu, 14 Feb 2019 17:30:00 +0000

All the recent news—from Facebook’s Cambridge Analytica snafu to various abuses of Twitter vulnerabilities—has you wondering: Should I delete myself from social media? We provide advice and links on how to tighten security if you want to cool down, or, if you’re ready to go nuclear, delete yourself permanently.

Categories:

Tags:

(Read more…)

The post Should you delete yourself from social media? appeared first on Malwarebytes Labs.

Read more

Collection 1 data breach: what you need to know

Credit to Author: Malwarebytes Labs| Date: Fri, 18 Jan 2019 18:33:40 +0000

In what’s being dubbed one of the largest data dumps in history, Collection 1 contains the data of over 770 million people. But is it really as bad as it sounds? We take a closer look and let users know what to do if their info is caught up in the mix.

Categories:

Tags:

(Read more…)

The post Collection 1 data breach: what you need to know appeared first on Malwarebytes Labs.

Read more

Assessing the security of a portable router: a look inside its hardware, part deux

Credit to Author: Jean Taggart| Date: Wed, 26 Dec 2018 19:15:59 +0000

In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.

Categories:

Tags:

(Read more…)

The post Assessing the security of a portable router: a look inside its hardware, part deux appeared first on Malwarebytes Labs.

Read more

Something else is phishy: How to detect phishing attempts on mobile

Credit to Author: Jovi Umawing| Date: Mon, 10 Dec 2018 15:00:56 +0000

Phishing is more problematic on smartphones than on desktops. Not only that, approaches to handling phishing attacks on mobile are quite different because their techniques are also different. So, how can users sniff out a mobile phish? Let us count the ways.

Categories:

Tags:

(Read more…)

The post Something else is phishy: How to detect phishing attempts on mobile appeared first on Malwarebytes Labs.

Read more

Advanced tools: Process Hacker

Credit to Author: Pieter Arntz| Date: Fri, 09 Nov 2018 16:16:46 +0000

A quick introduction to Process Hacker which is a powerful tool that can be used for troubleshooting, debugging, and reverse engineering.

Categories:

Tags:

(Read more…)

The post Advanced tools: Process Hacker appeared first on Malwarebytes Labs.

Read more