Knowing when it’s worth the risk: riskware explained

Credit to Author: Jovi Umawing| Date: Thu, 23 May 2019 19:22:47 +0000

Riskware is a type of software that, while considered legitimate, can still put users at risk in some way. Learn why anti-malware vendors detect it, and how to tell whether the apps you use are riskware or not.

Categories:

Tags:

(Read more…)

The post Knowing when it’s worth the risk: riskware explained appeared first on Malwarebytes Labs.

Read more

Vulnerabilities in financial mobile apps put consumers and businesses at risk

Credit to Author: Jovi Umawing| Date: Wed, 08 May 2019 16:30:00 +0000

It’s good to know that your bank’s website boasts that little green padlock, promotes secure communication, and follows a two-factor authentication (2FA) scheme. But are their mobile apps equally secure?

Categories:

Tags:

(Read more…)

The post Vulnerabilities in financial mobile apps put consumers and businesses at risk appeared first on Malwarebytes Labs.

Read more

Of hoodies and headphones: a spotlight on risks surrounding audio output devices

Credit to Author: Jovi Umawing| Date: Mon, 22 Apr 2019 18:15:34 +0000

For years, researchers have been poking holes in our audio output devices in the name of security and privacy. They’ve found many ways our headphones can be hacked or otherwise compromised. Learn what they discovered, and how you can secure your own.

Categories:

Tags:

(Read more…)

The post Of hoodies and headphones: a spotlight on risks surrounding audio output devices appeared first on Malwarebytes Labs.

Read more

Explained: like-farming

Credit to Author: Pieter Arntz| Date: Thu, 18 Apr 2019 15:00:00 +0000

Like-farming is a popular method on social media to harvest as many likes and shares as possible in order to increase the value of a site or domain. But what happens when scammers get in the game?

Categories:

Tags:

(Read more…)

The post Explained: like-farming appeared first on Malwarebytes Labs.

Read more

Reputation management in the age of cyberattacks against businesses

Credit to Author: Jovi Umawing| Date: Thu, 14 Mar 2019 16:15:59 +0000

A business’s reputation takes years to build. With the current climate of data breaches, unsurprisingly, destroying it could only take seconds. What can businesses do to protect their brands from a fallout following a cybersecurity incident? In this post, we answer these questions and more.

Categories:

Tags:

(Read more…)

The post Reputation management in the age of cyberattacks against businesses appeared first on Malwarebytes Labs.

Read more

Google Chrome announces plans to improve URL display, website identity

Credit to Author: Malwarebytes Labs| Date: Wed, 06 Feb 2019 18:16:47 +0000

The search giant isn’t “killing” (a.k.a. getting rid of) the URL, unlike some sensationalist and eye-rolling headlines have put it. They are slowly giving it a facelift.

Categories:

Tags:

(Read more…)

The post Google Chrome announces plans to improve URL display, website identity appeared first on Malwarebytes Labs.

Read more

How to browse the Internet safely at work

Credit to Author: Jovi Umawing| Date: Tue, 05 Feb 2019 16:00:44 +0000

This Safer Internet Day, we’re presenting a guideline to employees on how to navigate the online trenches safely, whether they’re on their desktop computers, company-owned laptops, or mobile devices. Who wants to be the one responsible for a breach? No one.

Categories:

Tags:

(Read more…)

The post How to browse the Internet safely at work appeared first on Malwarebytes Labs.

Read more