Credit to Author: Pieter Arntz| Date: Tue, 02 Oct 2018 15:00:00 +0000Read more
Credit to Author: Eugene Kaspersky| Date: Mon, 01 Oct 2018 10:51:40 +0000
The story of patent US5490216, which struck terror in the hearts of IT professionals and cost a whole lot of tech companies hundreds of millions of dollars.Read more
Credit to Author: William Tsing| Date: Tue, 25 Sep 2018 16:00:00 +0000Read more
Credit to Author: Jean Taggart| Date: Mon, 10 Sep 2018 15:00:00 +0000
|In this post, we acquire the necessary equipment to analyze the security of an inexpensive portable router, which we access through its diagnostic interface, and poke around inside.
The post Assessing the security of a portable router: a look inside its hardware appeared first on Malwarebytes Labs.Read more
Credit to Author: Vincent Jacquement| Date: Thu, 06 Sep 2018 21:15:38 +0000
As I discussed in my previous blog, How much value digital transformation has created so far in the Oil & Gas Industry, a debate is currently happening around which IIoT technology… Read more »Read more
Credit to Author: Pieter Arntz| Date: Fri, 31 Aug 2018 15:00:53 +0000
|What is regular expression (regex) and what makes it vulnerable to attack? Learn how to use regex safely and avoid ReDoS attacks in the process.
Credit to Author: Alexey Malanov| Date: Wed, 22 Aug 2018 14:00:35 +0000
What surprises do machine learning have in store for us? How difficult is it to trick a machine? And will we end up with Skynet and rise of the machines? Let’s take a look.Read more
Credit to Author: Pieter Arntz| Date: Thu, 16 Aug 2018 15:00:00 +0000
|Popular content management systems are easy to install and use. But how easy is it to keep them secure?
Credit to Author: Pieter Arntz| Date: Fri, 03 Aug 2018 15:00:00 +0000
|In our explained series, we talk about the impact of big data on our society. What is it, who uses it, and for what purposes?
Credit to Author: Pieter Arntz| Date: Wed, 18 Jul 2018 20:24:44 +0000
|Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they’re dangerous, and other times downright hilarious. What’s the real value in these devices?
The post What’s the real value—and danger—of smart assistants? appeared first on Malwarebytes Labs.Read more
Credit to Author: Malwarebytes Labs| Date: Thu, 12 Jul 2018 17:00:49 +0000
|Unfortunately, most ICOs (Initial Coin Offerings) turn out to be scams. So we feel compelled to ask our customers: would you like us to protect you from aal of them?