Security world

MalwareBytesSecurity

Five unsettling cyberthreats

Credit to Author: William Tsing| Date: Wed, 24 May 2017 18:39:46 +0000

Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. Here are 5 cyberthreats that if you’re not frightened by, you should be.

Categories:

Tags:

(Read more…)

The post Five unsettling cyberthreats appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

5 Unsettling cyberthreats

Credit to Author: William Tsing| Date: Wed, 24 May 2017 18:39:46 +0000

Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. Here are 5 cyberthreats that if you’re not frightened by, you should be.

Categories:

Tags:

(Read more…)

The post 5 Unsettling cyberthreats appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (May 15 – May 21)

Credit to Author: Malwarebytes Labs| Date: Mon, 22 May 2017 13:59:59 +0000

A compilation of notable security news and blog posts from the 15th of May to the 21st. We covered WannaCry, Privacy Awareness week, and what to do when you suspect stolen personal data.

Categories:

Tags:

(Read more…)

The post A week in security (May 15 – May 21) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (May 01 – May 07)

Credit to Author: Malwarebytes Labs| Date: Mon, 08 May 2017 18:00:38 +0000

A compilation of notable security news and blog posts from the 1st of May to the 7th. We touched on topics like Mac malware, OWASP, and password management.

Categories:

Tags:

(Read more…)

The post A week in security (May 01 – May 07) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

OWASP Top Ten – Boring security that pays off

Credit to Author: William Tsing| Date: Thu, 04 May 2017 16:00:28 +0000

OWASP recently published a draft list of the top 10 security vulnerabilities of 2017. While intended for developers seeking to code more secure applications, the top 10 list is based on actual survey data of threats seen in the wild and serves as a great starting point for organizations struggling with security priorities. Let’s take a look and see how long they’ve been around prior to publication.

Categories:

Tags:

(Read more…)

The post OWASP Top Ten – Boring security that pays off appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (Apr 24 – Apr 30)

Credit to Author: Malwarebytes Labs| Date: Mon, 01 May 2017 17:07:19 +0000

A compilation of notable security news and blog posts from the 24th of April to the 30th. We covered a lot of different subject, exploit kits, adware, Tech Support Scams, Android and Mac threats. And how to fight security fatigue.

Categories:

Tags:

(Read more…)

The post A week in security (Apr 24 – Apr 30) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (Apr 17 – Apr 23)

Credit to Author: Malwarebytes Labs| Date: Mon, 24 Apr 2017 14:59:43 +0000

A compilation of notable security news and blog posts from the 17th of April to the 23rd. We focused on the return of Locky ransomware, Moker Trojan, and more.

Categories:

Tags:

(Read more…)

The post A week in security (Apr 17 – Apr 23) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Mastodon: different social network, additional risks

Credit to Author: Zammis Clark| Date: Tue, 11 Apr 2017 15:00:18 +0000

Learn about the additional risks you can face when using Mastodon, a social network with important differences to traditional ones.

Categories:

Tags:

(Read more…)

The post Mastodon: different social network, additional risks appeared first on Malwarebytes Labs.

Read More