Something else is phishy: How to detect phishing attempts on mobile

Credit to Author: Jovi Umawing| Date: Mon, 10 Dec 2018 15:00:56 +0000

Phishing is more problematic on smartphones than on desktops. Not only that, approaches to handling phishing attacks on mobile are quite different because their techniques are also different. So, how can users sniff out a mobile phish? Let us count the ways.

Categories:

Tags:

(Read more…)

The post Something else is phishy: How to detect phishing attempts on mobile appeared first on Malwarebytes Labs.

Read more

Advanced tools: Process Hacker

Credit to Author: Pieter Arntz| Date: Fri, 09 Nov 2018 16:16:46 +0000

A quick introduction to Process Hacker which is a powerful tool that can be used for troubleshooting, debugging, and reverse engineering.

Categories:

Tags:

(Read more…)

The post Advanced tools: Process Hacker appeared first on Malwarebytes Labs.

Read more

6 ways to keep up with cybersecurity without going crazy

Credit to Author: Kayla Matthews| Date: Thu, 11 Oct 2018 15:00:00 +0000

As we dive headfirst into National Cyber Security Awareness Month, it seems only fitting to discuss ways to stay on top of cybersecurity news. But what if following along makes you feel a little overwhelmed? Try these six methods of information-gathering to brush up on your cybersecurity know-how without losing your mind.

Categories:

Tags:

(Read more…)

The post 6 ways to keep up with cybersecurity without going crazy appeared first on Malwarebytes Labs.

Read more

5 safe ways to get back at spammers: a guide to wasting time

Credit to Author: Christopher Boyd| Date: Tue, 11 Sep 2018 15:00:00 +0000

We take a look at some of the safe ways to waste a spammer’s time, whether by email or telephone.

Categories:

Tags:

(Read more…)

The post 5 safe ways to get back at spammers: a guide to wasting time appeared first on Malwarebytes Labs.

Read more

How to block ads like a pro

Credit to Author: Adam McNeil| Date: Thu, 19 Jul 2018 17:24:34 +0000

In part one of this series, we had a look at a few reasons why you should block ads on your network and devices. In the second part, we’ll cover a few of the common ad blocking utilities and how to best configure those tools for maximum effectiveness.

Categories:

Tags:

(Read more…)

The post How to block ads like a pro appeared first on Malwarebytes Labs.

Read more

So you’ve been asked to start a threat intel program

Credit to Author: William Tsing| Date: Tue, 10 Jul 2018 15:00:00 +0000

What are the bumps in the road you can expect and avoid when setting up a threat intel progarm for your business?

Categories:

Tags:

(Read more…)

The post So you’ve been asked to start a threat intel program appeared first on Malwarebytes Labs.

Read more

Internet Safety Month: How to manage your child’s online presence

Credit to Author: Jovi Umawing| Date: Thu, 28 Jun 2018 15:32:14 +0000

Parents with good intentions may not realize that by sharing photos of their children on social media, they have already created their online presence. The good news is that their online reputation can be managed, and you can teach them how to do it, too. 

Categories:

Tags:

(Read more…)

The post Internet Safety Month: How to manage your child’s online presence appeared first on Malwarebytes Labs.

Read more

Five easy ways to recognize and dispose of malicious emails

Credit to Author: Pieter Arntz| Date: Tue, 19 Jun 2018 15:00:00 +0000

What should you check for to determine if an email is spam or malicious? Here are five red flags to look for—and what to do with those malicious emails when you find them.

Categories:

Tags:

(Read more…)

The post Five easy ways to recognize and dispose of malicious emails appeared first on Malwarebytes Labs.

Read more

Where did the tech support scam blacklist go?

Credit to Author: William Tsing| Date: Fri, 11 May 2018 15:00:00 +0000

We’ve removed our blacklist of recognized tech support scammers from our tech scam support page. Here’s what we’re doing instead.

Categories:

Tags:

(Read more…)

The post Where did the tech support scam blacklist go? appeared first on Malwarebytes Labs.

Read more

Keeping your business and personal instant messages secure

Credit to Author: Christopher Boyd| Date: Wed, 11 Apr 2018 15:00:00 +0000

Most people want to know their instant messages are securely wrapped up—whether that’s for personal privacy or protecting business communications. There are a lot of solutions out there for better securing IMs.

Categories:

Tags:

(Read more…)

The post Keeping your business and personal instant messages secure appeared first on Malwarebytes Labs.

Read more