Getting started with Google Password Manager

Credit to Author: JR Raphael| Date: Fri, 29 May 2020 03:00:00 -0700

If you’re still trying to remember all of your passwords and then type ’em into sites by hand, let me tell you: You’re doing it wrong.

With all the credentials we have to keep track of these days, there’s just no way the human brain can handle the task of storing the specifics — at least, not if you’re using complex, unique passwords that aren’t repeated (or almost repeated, even) from one site to the next. That’s where a password manager comes into play: It securely stores all your sign-in info for you and then fills it in as needed.

While there’s a case to be made for leaning on a dedicated app for that purpose (for reasons we’ll discuss further in a moment), Google has its own password management system built right into Chrome. And it’s far better to rely on that than to use nothing at all.

To read this article in full, please click here

Read more

How blockchain could help block fake news

Credit to Author: Lucas Mearian| Date: Mon, 17 Feb 2020 03:00:00 -0800

In 2018, a video of former President Barrack Obama surfaced on YouTube explaining how easily technology could be used to manipulate video and create fake news. It got more than 7.2 million views.

In the video, Obama explains how we live in dangerous times when “enemies” can make anyone say anything at any point in time. Moments later, it’s revealed that the video was itself faked.

Whether its news articles, images or video, fake and misleading content has proliferated across the internet over the past five or so years. One possible solution to the problem now being proposed would standardize how content is delivered online, with anything outside those standards not trusted.

To read this article in full, please click here

Read more

The usual suspects

Credit to Author: Sharky| Date: Fri, 13 Dec 2019 03:00:00 -0800

One morning Wilma, the print shop manager at a beer distributor, discovers that her computer has a virus. It’s no big deal — sometimes bad things happen to good computers — so she cleans up the system and gets on with her day.

But a few days later the system is infected again.

Considerably more annoyed this time, she contacts Betty (the company’s sole IT person) to get some assistance and make sure the system is 100% clean. After disinfecting the system, Betty checks the browser history and finds that someone has been making late-night visits to X-rated websites.

The question then becomes, Who is using company resources to watch porn? At most companies, suspicion would immediately fall on the nighttime cleaning crew. But the print shop is located in the warehouse, to which the cleaning crew doesn’t have access.

To read this article in full, please click here

Read more

IoT bills and guidelines: a global response

Credit to Author: Christopher Boyd| Date: Fri, 22 Nov 2019 16:27:47 +0000

IoT laws and guidelines abound, as we take a look what’s happening around the world in the name of securing Internet-connected devices.

Categories:

Tags:

(Read more…)

The post IoT bills and guidelines: a global response appeared first on Malwarebytes Labs.

Read more

A week in security (October 28 – November 3)

Credit to Author: Malwarebytes Labs| Date: Mon, 04 Nov 2019 16:37:57 +0000

A roundup of the latest cybersecurity news for the week of October 28 – November 3, including cyberattacks against SMBs, the Internet’s 50th birthday, stalkerware, donation scams, and more.

Categories:

Tags:

(Read more…)

The post A week in security (October 28 – November 3) appeared first on Malwarebytes Labs.

Read more