Security world

MalwareBytesSecurity

A week in security (July 16 – July 22)

Credit to Author: Malwarebytes Labs| Date: Mon, 23 Jul 2018 17:30:01 +0000

A round up of the security news from July 16 – July 22, including the release of our quarterly Cybercrime tactics and techniques report, breaches, airport security, bug bounties, and more.

Categories:

Tags:

(Read more…)

The post A week in security (July 16 – July 22) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

How to block ads like a pro

Credit to Author: Adam McNeil| Date: Thu, 19 Jul 2018 17:24:34 +0000

In part one of this series, we had a look at a few reasons why you should block ads on your network and devices. In the second part, we’ll cover a few of the common ad blocking utilities and how to best configure those tools for maximum effectiveness.

Categories:

Tags:

(Read more…)

The post How to block ads like a pro appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

What’s the real value—and danger—of smart assistants?

Credit to Author: Pieter Arntz| Date: Wed, 18 Jul 2018 20:24:44 +0000

Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they’re dangerous, and other times downright hilarious. What’s the real value in these devices?

Categories:

Tags:

(Read more…)

The post What’s the real value—and danger—of smart assistants? appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

5 ways to find and fix open source vulnerabilities

Credit to Author: Malwarebytes Labs| Date: Tue, 17 Jul 2018 15:00:00 +0000

A recent discovery of surreptitious execution of cryptomining code by a sandboxed app, riding piggyback on the open source software (OSS) ecosystem, raises pertinent questions about open source vulnerabilities. Here are five ways developers can find and fix vulnerabilities and their dependencies.

Categories:

Tags:

(Read more…)

The post 5 ways to find and fix open source vulnerabilities appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (July 9 – July 15)

Credit to Author: Malwarebytes Labs| Date: Mon, 16 Jul 2018 15:00:01 +0000

A roundup of the security news from July 9 – July 15, including sextortion, Spectre, cryptomining, mobile malware, ICO scams and more.

Categories:

Tags:

(Read more…)

The post A week in security (July 9 – July 15) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Block all or nothing to prevent ICO fraud?

Credit to Author: Malwarebytes Labs| Date: Thu, 12 Jul 2018 17:00:49 +0000

Unfortunately, most ICOs (Initial Coin Offerings) turn out to be scams. So we feel compelled to ask our customers: would you like us to protect you from aal of them?

Categories:

Tags:

(Read more…)

The post Block all or nothing to prevent ICO fraud? appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (July 2 – July 8)

Credit to Author: Malwarebytes Labs| Date: Mon, 09 Jul 2018 17:00:00 +0000

A roundup of the security news from July 2 – July 8, including a macro-less infection tecnique, online project management tools and crypto-mining malware campaigns.

Categories:

Tags:

(Read more…)

The post A week in security (July 2 – July 8) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Can we trust our online project management tools?

Credit to Author: Pieter Arntz| Date: Fri, 06 Jul 2018 15:00:00 +0000

Online project management tools can be not only useful, but a lifeline for developers and PMs who juggle multiple tasks with competing deadlines. How can we use them in a secure way?

Categories:

Tags:

(Read more…)

The post Can we trust our online project management tools? appeared first on Malwarebytes Labs.

Read More