Facial recognition: tech giants take a step back

Credit to Author: Pieter Arntz| Date: Thu, 18 Jun 2020 15:30:00 +0000

Some of the big players in the field of facial recognition announced they will not provide their technology to law enforcement while there is no governing law.

Categories:

Tags:

(Read more…)

The post Facial recognition: tech giants take a step back appeared first on Malwarebytes Labs.

Read more

Child identity theft, part 1: On familiar fraud

Credit to Author: Jovi Umawing| Date: Tue, 03 Mar 2020 20:17:19 +0000

In this two-part series on child identity theft, we shed light on the growing problem of familiar fraud, where those entrusted with a minor’s information are the very ones who abuse it.

Categories:

Tags:

(Read more…)

The post Child identity theft, part 1: On familiar fraud appeared first on Malwarebytes Labs.

Read more

What role does data destruction play in cybersecurity?

Credit to Author: Kayla Matthews| Date: Fri, 20 Sep 2019 18:18:26 +0000

Organizations are keen to protect the personal data of their employees and customers from cyberattack. But what about the data they no longer need? We discuss why data destruction is just as important to cybersecurity as protection.

Categories:

Tags:

(Read more…)

The post What role does data destruction play in cybersecurity? appeared first on Malwarebytes Labs.

Read more

How to securely send your personal information

Credit to Author: Seth Rosenblatt| Date: Mon, 08 Jul 2019 16:00:00 +0000

On its own, email is not safe for sending credit card or passport numbers. Here’s how to securely send personal information over the Internet.

Categories:

Tags:

(Read more…)

The post How to securely send your personal information appeared first on Malwarebytes Labs.

Read more

Reputation management in the age of cyberattacks against businesses

Credit to Author: Jovi Umawing| Date: Thu, 14 Mar 2019 16:15:59 +0000

A business’s reputation takes years to build. With the current climate of data breaches, unsurprisingly, destroying it could only take seconds. What can businesses do to protect their brands from a fallout following a cybersecurity incident? In this post, we answer these questions and more.

Categories:

Tags:

(Read more…)

The post Reputation management in the age of cyberattacks against businesses appeared first on Malwarebytes Labs.

Read more

2018: The year of the data breach tsunami

Credit to Author: Logan Strain| Date: Fri, 28 Dec 2018 16:00:00 +0000

To get a sense of the grim state of data security today, take a look at this infographic from TruthFinder that explains why 2018 was the year of the data breach tsunami.

Categories:

Tags:

(Read more…)

The post 2018: The year of the data breach tsunami appeared first on Malwarebytes Labs.

Read more

What DNA testing kit companies are really doing with your data

Credit to Author: Wendy Zamora| Date: Tue, 20 Nov 2018 15:00:00 +0000

Consumer DNA testing kits were a top holiday present last season, and are expected to be big sellers again. But should you think twice before hitting the buy button? What’s really happening with all your genetic data? We take a deep dive into all the areas of concern—plus what the testing companies are getting right—when it comes to the security of your DNA and the privacy of your sensitive personal information.

Categories:

Tags:

(Read more…)

The post What DNA testing kit companies are really doing with your data appeared first on Malwarebytes Labs.

Read more