Cybersecurity New Year’s resolutions, you say? Why not.

Credit to Author: Jovi Umawing| Date: Fri, 19 Jan 2018 16:00:00 +0000

It’s no surprise that our resolutions are usually about health, finances, relationships, and self-improvement. As all of us live digital lives, too, why not think up cybersecurity New Year’s resolution that concern our online health and safety?

Categories:

Tags:

(Read more…)

The post Cybersecurity New Year’s resolutions, you say? Why not. appeared first on Malwarebytes Labs.

Read more

A state of constant uncertainty or uncertain constancy? Fast flux explained

Credit to Author: Malwarebytes Labs| Date: Tue, 12 Dec 2017 16:00:00 +0000

Although often seen as an illegal cybercriminal tactic, the methodology behind fast flux is actually far from evil. So how is it being abused? Read on to learn more.

Categories:

Tags:

(Read more…)

The post A state of constant uncertainty or uncertain constancy? Fast flux explained appeared first on Malwarebytes Labs.

Read more

Explained: the cloud

Credit to Author: Pieter Arntz| Date: Tue, 14 Nov 2017 18:24:53 +0000

The cloud. What is it? What are the pros and cons, and how can we make it as safe as possible? This post covers the basics.

Categories:

Tags:

(Read more…)

The post Explained: the cloud appeared first on Malwarebytes Labs.

Read more

Explained: blockchain technology

Credit to Author: Pieter Arntz| Date: Mon, 06 Nov 2017 17:45:49 +0000

Continuing education about cryptocurrency, we provide some insight into the technology behind blockchain and explain what makes it secure.

Categories:

Tags:

(Read more…)

The post Explained: blockchain technology appeared first on Malwarebytes Labs.

Read more

What is cryptocurrency and why do cybercriminals love it?

Credit to Author: Wendy Zamora| Date: Fri, 03 Nov 2017 14:00:49 +0000

Ever stumble into a conversation about Bitcoin and wonder, “What is cryptocurrency, anyway?” Read on to learn how it works and why cybercriminals love it.

Categories:

Tags:

(Read more…)

The post What is cryptocurrency and why do cybercriminals love it? appeared first on Malwarebytes Labs.

Read more

Our computers, ourselves: digital vs. biological security

Credit to Author: Chris Fistonich| Date: Wed, 25 Oct 2017 23:12:05 +0000

People often wonder how computer and biological viruses are the same. We compare the two, and what our computers and bodies do to fight them—it’s digital vs. biological security.

Categories:

Tags:

(Read more…)

The post Our computers, ourselves: digital vs. biological security appeared first on Malwarebytes Labs.

Read more

When cybersecurity isn’t all cyber: What does it really take to work in cybersecurity?

Credit to Author: Malwarebytes Labs| Date: Wed, 25 Oct 2017 20:29:25 +0000

Although lucrative and future-proof, being part of the cybersecurity workforce doesn’t just require one to be knowledgeable about code, network topologies, or social engineering tactics. People are still the most critical part of a business’s security process.

Categories:

Tags:

(Read more…)

The post When cybersecurity isn’t all cyber: What does it really take to work in cybersecurity? appeared first on Malwarebytes Labs.

Read more

How to create an intentional culture of security

Credit to Author: Malwarebytes Labs| Date: Thu, 19 Oct 2017 18:00:48 +0000

A culture of security in the workplace has always existed; it just may be unrecognized, weak, or inconsistent. How can businesses get employees to accept and champion an intentional culture of security? And why should they? We’ll show you how.

Categories:

Tags:

(Read more…)

The post How to create an intentional culture of security appeared first on Malwarebytes Labs.

Read more