How to secure your content management system

Credit to Author: Pieter Arntz| Date: Thu, 16 Aug 2018 15:00:00 +0000

Popular content management systems are easy to install and use. But how easy is it to keep them secure?

Categories:

Tags:

(Read more…)

The post How to secure your content management system appeared first on Malwarebytes Labs.

Read more

A week in security (August 6 – August 12)

Credit to Author: Malwarebytes Labs| Date: Mon, 13 Aug 2018 16:37:10 +0000

A round-up of the security news from August 6 – August 12, including ransomware, interesting talks during BlackHat, botnets, and the evils of JavaScript.

Categories:

Tags:

(Read more…)

The post A week in security (August 6 – August 12) appeared first on Malwarebytes Labs.

Read more

A week in security (August 6 – 12)

Credit to Author: Malwarebytes Labs| Date: Mon, 13 Aug 2018 16:37:10 +0000

A round-up of the security news from August 6 – 12, including ransomware, interesting talks during BlackHat, botnets, and the evils of JavaScript.

Categories:

Tags:

(Read more…)

The post A week in security (August 6 – 12) appeared first on Malwarebytes Labs.

Read more

How to protect your RDP access from ransomware attacks

Credit to Author: Pieter Arntz| Date: Fri, 10 Aug 2018 16:13:18 +0000

Ransomware distributors have started using RDP to gain access to business networks. Do you have your remote desktops under control?

Categories:

Tags:

(Read more…)

The post How to protect your RDP access from ransomware attacks appeared first on Malwarebytes Labs.

Read more

White hat, black hat, and the emergence of the gray hat: the true costs of cybercrime

Credit to Author: Malwarebytes Labs| Date: Wed, 08 Aug 2018 14:00:00 +0000

Osterman Research recently completed a major survey on behalf of Malwarebytes to determine the actual cost of cybercrime to businesses. Here’s what we discovered.

Categories:

Tags:

(Read more…)

The post White hat, black hat, and the emergence of the gray hat: the true costs of cybercrime appeared first on Malwarebytes Labs.

Read more

A week in security (July 30 – August 5)

Credit to Author: Malwarebytes Labs| Date: Mon, 06 Aug 2018 16:07:39 +0000

A roundup of the security news from July 30 – August 5, including cryptomining, big data, social engineering, and more.

Categories:

Tags:

(Read more…)

The post A week in security (July 30 – August 5) appeared first on Malwarebytes Labs.

Read more

Explained: What is big data?

Credit to Author: Pieter Arntz| Date: Fri, 03 Aug 2018 15:00:00 +0000

In our explained series, we talk about the impact of big data on our society. What is it, who uses it, and for what purposes?

Categories:

Tags:

(Read more…)

The post Explained: What is big data? appeared first on Malwarebytes Labs.

Read more

A week in security (July 23 – July 29)

Credit to Author: Malwarebytes Labs| Date: Mon, 30 Jul 2018 15:57:10 +0000

A round up of the security news from July 23 – July 29, including the introduction of Malwarebytes Browser Extensions, and new malware HiddenBee, Proton, and MobiDash.

Categories:

Tags:

(Read more…)

The post A week in security (July 23 – July 29) appeared first on Malwarebytes Labs.

Read more

A week in security (July 16 – July 22)

Credit to Author: Malwarebytes Labs| Date: Mon, 23 Jul 2018 17:30:01 +0000

A round up of the security news from July 16 – July 22, including the release of our quarterly Cybercrime tactics and techniques report, breaches, airport security, bug bounties, and more.

Categories:

Tags:

(Read more…)

The post A week in security (July 16 – July 22) appeared first on Malwarebytes Labs.

Read more

How to block ads like a pro

Credit to Author: Adam McNeil| Date: Thu, 19 Jul 2018 17:24:34 +0000

In part one of this series, we had a look at a few reasons why you should block ads on your network and devices. In the second part, we’ll cover a few of the common ad blocking utilities and how to best configure those tools for maximum effectiveness.

Categories:

Tags:

(Read more…)

The post How to block ads like a pro appeared first on Malwarebytes Labs.

Read more

What’s the real value—and danger—of smart assistants?

Credit to Author: Pieter Arntz| Date: Wed, 18 Jul 2018 20:24:44 +0000

Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they’re dangerous, and other times downright hilarious. What’s the real value in these devices?

Categories:

Tags:

(Read more…)

The post What’s the real value—and danger—of smart assistants? appeared first on Malwarebytes Labs.

Read more