Bring your own security (BYOS): good idea or not?

Credit to Author: Pieter Arntz| Date: Tue, 02 Oct 2018 15:00:00 +0000

We know about BYOD. What about BYOS? Is it a good idea to Bring Your Own Security, or use your own security solution on devices that you use for work? What if they are company owned? We walk companies and employees through the pros and cons of each.

Categories:

Tags:

(Read more…)

The post Bring your own security (BYOS): good idea or not? appeared first on Malwarebytes Labs.

Read more

Safari users: Where did your extensions go?

Credit to Author: William Tsing| Date: Tue, 25 Sep 2018 16:00:00 +0000

Safari has begun blocking legacy extensions installed from outside the Extensions Gallery. Unfortunately, implementation of this policy has been abrupt, with little explanation for users on why their extensions are being yanked. Let’s look at how Apple’s new policy and how its application impacts security.

Categories:

Tags:

(Read more…)

The post Safari users: Where did your extensions go? appeared first on Malwarebytes Labs.

Read more

Assessing the security of a portable router: a look inside its hardware

Credit to Author: Jean Taggart| Date: Mon, 10 Sep 2018 15:00:00 +0000

In this post, we acquire the necessary equipment to analyze the security of an inexpensive portable router, which we access through its diagnostic interface, and poke around inside.

Categories:

Tags:

(Read more…)

The post Assessing the security of a portable router: a look inside its hardware appeared first on Malwarebytes Labs.

Read more

Accelerating technology and domain expertise are the recipe for IT/OT convergence in Oil and Gas

Credit to Author: Vincent Jacquement| Date: Thu, 06 Sep 2018 21:15:38 +0000

As I discussed in my previous blog,  How much value digital transformation has created so far in the Oil & Gas Industry, a debate is currently happening around which IIoT technology… Read more »

The post Accelerating technology and domain expertise are the recipe for IT/OT convergence in Oil and Gas appeared first on Schneider Electric Blog.

Read more

Explained: regular expression (regex)

Credit to Author: Pieter Arntz| Date: Fri, 31 Aug 2018 15:00:53 +0000

What is regular expression (regex) and what makes it vulnerable to attack? Learn how to use regex safely and avoid ReDoS attacks in the process.

Categories:

Tags:

(Read more…)

The post Explained: regular expression (regex) appeared first on Malwarebytes Labs.

Read more

How to secure your content management system

Credit to Author: Pieter Arntz| Date: Thu, 16 Aug 2018 15:00:00 +0000

Popular content management systems are easy to install and use. But how easy is it to keep them secure?

Categories:

Tags:

(Read more…)

The post How to secure your content management system appeared first on Malwarebytes Labs.

Read more

Explained: What is big data?

Credit to Author: Pieter Arntz| Date: Fri, 03 Aug 2018 15:00:00 +0000

In our explained series, we talk about the impact of big data on our society. What is it, who uses it, and for what purposes?

Categories:

Tags:

(Read more…)

The post Explained: What is big data? appeared first on Malwarebytes Labs.

Read more

What’s the real value—and danger—of smart assistants?

Credit to Author: Pieter Arntz| Date: Wed, 18 Jul 2018 20:24:44 +0000

Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they’re dangerous, and other times downright hilarious. What’s the real value in these devices?

Categories:

Tags:

(Read more…)

The post What’s the real value—and danger—of smart assistants? appeared first on Malwarebytes Labs.

Read more

Block all or nothing to prevent ICO fraud?

Credit to Author: Malwarebytes Labs| Date: Thu, 12 Jul 2018 17:00:49 +0000

Unfortunately, most ICOs (Initial Coin Offerings) turn out to be scams. So we feel compelled to ask our customers: would you like us to protect you from aal of them?

Categories:

Tags:

(Read more…)

The post Block all or nothing to prevent ICO fraud? appeared first on Malwarebytes Labs.

Read more