Everything you need to know about ATM attacks and fraud: Part 1

Credit to Author: Jovi Umawing| Date: Wed, 29 May 2019 15:00:00 +0000

If you’re familiar with skimming, you may have also heard of shimming, card trapping, and cash trapping. These are attacks and scams targeted at ATMs. Part 1 of our series explores various ATM attack scenarios and explains what users should look out for when using an ATM.

Categories:

Tags:

(Read more…)

The post Everything you need to know about ATM attacks and fraud: Part 1 appeared first on Malwarebytes Labs.

Read more

Employee education strategies that work to change behavior

Credit to Author: Kacy Zurkus| Date: Tue, 28 May 2019 15:25:52 +0000

Using technology alone to combat cyberattacks is not enough. That’s why employee education on security awareness should be an integral part of any company’s cybersecurity policy.

Categories:

Tags:

(Read more…)

The post Employee education strategies that work to change behavior appeared first on Malwarebytes Labs.

Read more

The lazy person’s guide to cybersecurity: minimum effort for maximum protection

Credit to Author: Pieter Arntz| Date: Thu, 21 Feb 2019 17:00:00 +0000

How can we help our less tech-savvy friends stay more secure online? By giving them a lazy person’s guide to cybersecurity, we can offer maximum protection for minimal effort.

Categories:

Tags:

(Read more…)

The post The lazy person’s guide to cybersecurity: minimum effort for maximum protection appeared first on Malwarebytes Labs.

Read more

Should you delete yourself from social media?

Credit to Author: Jean Taggart| Date: Thu, 14 Feb 2019 17:30:00 +0000

All the recent news—from Facebook’s Cambridge Analytica snafu to various abuses of Twitter vulnerabilities—has you wondering: Should I delete myself from social media? We provide advice and links on how to tighten security if you want to cool down, or, if you’re ready to go nuclear, delete yourself permanently.

Categories:

Tags:

(Read more…)

The post Should you delete yourself from social media? appeared first on Malwarebytes Labs.

Read more

Collection 1 data breach: what you need to know

Credit to Author: Malwarebytes Labs| Date: Fri, 18 Jan 2019 18:33:40 +0000

In what’s being dubbed one of the largest data dumps in history, Collection 1 contains the data of over 770 million people. But is it really as bad as it sounds? We take a closer look and let users know what to do if their info is caught up in the mix.

Categories:

Tags:

(Read more…)

The post Collection 1 data breach: what you need to know appeared first on Malwarebytes Labs.

Read more

Assessing the security of a portable router: a look inside its hardware, part deux

Credit to Author: Jean Taggart| Date: Wed, 26 Dec 2018 19:15:59 +0000

In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.

Categories:

Tags:

(Read more…)

The post Assessing the security of a portable router: a look inside its hardware, part deux appeared first on Malwarebytes Labs.

Read more

Something else is phishy: How to detect phishing attempts on mobile

Credit to Author: Jovi Umawing| Date: Mon, 10 Dec 2018 15:00:56 +0000

Phishing is more problematic on smartphones than on desktops. Not only that, approaches to handling phishing attacks on mobile are quite different because their techniques are also different. So, how can users sniff out a mobile phish? Let us count the ways.

Categories:

Tags:

(Read more…)

The post Something else is phishy: How to detect phishing attempts on mobile appeared first on Malwarebytes Labs.

Read more

Advanced tools: Process Hacker

Credit to Author: Pieter Arntz| Date: Fri, 09 Nov 2018 16:16:46 +0000

A quick introduction to Process Hacker which is a powerful tool that can be used for troubleshooting, debugging, and reverse engineering.

Categories:

Tags:

(Read more…)

The post Advanced tools: Process Hacker appeared first on Malwarebytes Labs.

Read more

6 ways to keep up with cybersecurity without going crazy

Credit to Author: Kayla Matthews| Date: Thu, 11 Oct 2018 15:00:00 +0000

As we dive headfirst into National Cyber Security Awareness Month, it seems only fitting to discuss ways to stay on top of cybersecurity news. But what if following along makes you feel a little overwhelmed? Try these six methods of information-gathering to brush up on your cybersecurity know-how without losing your mind.

Categories:

Tags:

(Read more…)

The post 6 ways to keep up with cybersecurity without going crazy appeared first on Malwarebytes Labs.

Read more

5 safe ways to get back at spammers: a guide to wasting time

Credit to Author: Christopher Boyd| Date: Tue, 11 Sep 2018 15:00:00 +0000

We take a look at some of the safe ways to waste a spammer’s time, whether by email or telephone.

Categories:

Tags:

(Read more…)

The post 5 safe ways to get back at spammers: a guide to wasting time appeared first on Malwarebytes Labs.

Read more

How to block ads like a pro

Credit to Author: Adam McNeil| Date: Thu, 19 Jul 2018 17:24:34 +0000

In part one of this series, we had a look at a few reasons why you should block ads on your network and devices. In the second part, we’ll cover a few of the common ad blocking utilities and how to best configure those tools for maximum effectiveness.

Categories:

Tags:

(Read more…)

The post How to block ads like a pro appeared first on Malwarebytes Labs.

Read more