What to do when you receive an extortion email

Credit to Author: Thomas Reed| Date: Fri, 01 May 2020 15:30:00 +0000

Extortion emails are nothing new, but with the recent increase in frequency, many people are looking for guidance. If you have received such a message and want to know how you should respond, you’re in the right place. Read on!

Categories:

Tags:

(Read more…)

The post What to do when you receive an extortion email appeared first on Malwarebytes Labs.

Read more

What to do when you receive an extortion e-mail

Credit to Author: Thomas Reed| Date: Fri, 01 May 2020 15:30:00 +0000

xtortion e-mails are nothing new, but with the recent increase in frequency, many people are looking for guidance. If you have received such an e-mail message and want to know how you should respond, you’re in the right place. Read on!

Categories:

Tags:

(Read more…)

The post What to do when you receive an extortion e-mail appeared first on Malwarebytes Labs.

Read more

5 simple steps to securing your remote employees

Credit to Author: David Ruiz| Date: Wed, 04 Sep 2019 14:06:26 +0000

Modern businesses require modern cybersecurity, and modern cybersecurity means more than just implementing the latest tech. It also means implementing good governance.

Categories:

Tags:

(Read more…)

The post 5 simple steps to securing your remote employees appeared first on Malwarebytes Labs.

Read more

Data and device security for domestic abuse survivors

Credit to Author: David Ruiz| Date: Tue, 13 Aug 2019 16:33:22 +0000

Many domestic abuse survivors need help before stalkerware strikes. Here, we give basic advice on device security and protecting sensitive data.

Categories:

Tags:

(Read more…)

The post Data and device security for domestic abuse survivors appeared first on Malwarebytes Labs.

Read more