Introducing Malwarebytes Privacy

Credit to Author: Malwarebytes Labs| Date: Thu, 23 Apr 2020 12:00:00 +0000

It’s important to use a VPN you can trust to protect your privacy on the Internet. That’s why we launched Malwarebytes Privacy, a next-gen VPN for better privacy, performance, and security when you go online.

Categories:

Tags:

(Read more…)

The post Introducing Malwarebytes Privacy appeared first on Malwarebytes Labs.

Read more

Child identity theft, part 1: On familiar fraud

Credit to Author: Jovi Umawing| Date: Tue, 03 Mar 2020 20:17:19 +0000

In this two-part series on child identity theft, we shed light on the growing problem of familiar fraud, where those entrusted with a minor’s information are the very ones who abuse it.

Categories:

Tags:

(Read more…)

The post Child identity theft, part 1: On familiar fraud appeared first on Malwarebytes Labs.

Read more

Business in the front, party in the back: backdoors in elastic servers expose private data

Credit to Author: Vasilios Hioureas| Date: Fri, 17 Jan 2020 18:58:47 +0000

It’s all too easy to discover data leaks online, especially in cloud services. We take a look at misconfigurations in elastic servers that lead to exposed data on the Internet.

Categories:

Tags:

(Read more…)

The post Business in the front, party in the back: backdoors in elastic servers expose private data appeared first on Malwarebytes Labs.

Read more

How to protect yourself from doxing

Credit to Author: Osama Tahir| Date: Fri, 25 Oct 2019 15:37:31 +0000

Doxing, or collecting and spreading private information about a user online, is a form of cyber harassment, stalking, and even a potential threat to physical safety. Here’s what you can do to protect yourself against it.

Categories:

Tags:

(Read more…)

The post How to protect yourself from doxing appeared first on Malwarebytes Labs.

Read more

What role does data destruction play in cybersecurity?

Credit to Author: Kayla Matthews| Date: Fri, 20 Sep 2019 18:18:26 +0000

Organizations are keen to protect the personal data of their employees and customers from cyberattack. But what about the data they no longer need? We discuss why data destruction is just as important to cybersecurity as protection.

Categories:

Tags:

(Read more…)

The post What role does data destruction play in cybersecurity? appeared first on Malwarebytes Labs.

Read more

How much personalization is too much?

Credit to Author: Seth Rosenblatt| Date: Mon, 19 Aug 2019 15:00:00 +0000

Personalization is the new mantra of marketers—and most people are perfectly okay with that. But when does personalization cross the line into invasive? And what can uncomfortable consumers do about blocking it?

Categories:

Tags:

(Read more…)

The post How much personalization is too much? appeared first on Malwarebytes Labs.

Read more

The top six takeaways for corporate data privacy compliance

Credit to Author: David Ruiz| Date: Fri, 03 May 2019 15:00:00 +0000

Here are Labs’ top six takeaways from our data privacy and cybersecurity law series on corporate data privacy compliance. From emerging startups to burgeoning enterprises, these rules help not just with legal liability, but also user trust.

Categories:

Tags:

(Read more…)

The post The top six takeaways for corporate data privacy compliance appeared first on Malwarebytes Labs.

Read more