My precious: security, privacy, and smart jewelry

Credit to Author: Jovi Umawing| Date: Wed, 14 Nov 2018 17:27:23 +0000

Fashionable and functional. These are the makings of smart jewelry. They aren’t secure, yet some are used to secure user data and online accounts. Should you still buy one?

Categories:

Tags:

(Read more…)

The post My precious: security, privacy, and smart jewelry appeared first on Malwarebytes Labs.

Read more

TrickBot takes over as top business threat

Credit to Author: Wendy Zamora| Date: Wed, 14 Nov 2018 15:00:37 +0000

There’s a newer, more sophisticated banking Trojan in town attempting to penetrate business networks and giving Emotet a run for its money. And its name is TrickBot. Learn how this threat is giving organizations a run for their money.

Categories:

Tags:

(Read more…)

The post TrickBot takes over as top business threat appeared first on Malwarebytes Labs.

Read more

How to create a sticky cybersecurity training program

Credit to Author: Jovi Umawing| Date: Thu, 08 Nov 2018 17:00:00 +0000

Organizations know that training employees is not only expensive but time-consuming. But when it comes to cybersecurity, training is a must. Whether you’re an organization of 50 or 50,000, this guide will show you the ropes in creating a cybersecurity training program that works from start to finish.

Categories:

Tags:

(Read more…)

The post How to create a sticky cybersecurity training program appeared first on Malwarebytes Labs.

Read more

Removing the jam in your printer security

Credit to Author: Christopher Boyd| Date: Tue, 30 Oct 2018 16:00:00 +0000

We take a look at printer security, an oft-neglected aspect of locking down an organization’s network.

Categories:

Tags:

(Read more…)

The post Removing the jam in your printer security appeared first on Malwarebytes Labs.

Read more

Sextortion emails: They’re probably not watching you

Credit to Author: William Tsing| Date: Thu, 25 Oct 2018 15:00:00 +0000

Yes, those sextortion email scams using old passwords are still making the rounds. How can you spot a real sextortion attempt from an empty threat? And when should you report to authorities? Read on to find out.

Categories:

Tags:

(Read more…)

The post Sextortion emails: They’re probably not watching you appeared first on Malwarebytes Labs.

Read more

Workplace violence: the forgotten insider threat

Credit to Author: Jovi Umawing| Date: Fri, 12 Oct 2018 16:00:00 +0000

Among insider threats, workplace violence could be considered the most dangerous. And yet, the majority of organizations are not prepared. What should they do to protect their employees?

Categories:

Tags:

(Read more…)

The post Workplace violence: the forgotten insider threat appeared first on Malwarebytes Labs.

Read more

6 ways to keep up with cybersecurity without going crazy

Credit to Author: Kayla Matthews| Date: Thu, 11 Oct 2018 15:00:00 +0000

As we dive headfirst into National Cyber Security Awareness Month, it seems only fitting to discuss ways to stay on top of cybersecurity news. But what if following along makes you feel a little overwhelmed? Try these six methods of information-gathering to brush up on your cybersecurity know-how without losing your mind.

Categories:

Tags:

(Read more…)

The post 6 ways to keep up with cybersecurity without going crazy appeared first on Malwarebytes Labs.

Read more

Malwarebytes is a champion of National Cybersecurity Awareness Month

Credit to Author: Jovi Umawing| Date: Mon, 01 Oct 2018 14:00:31 +0000

As we bid hello to National Cybersecurity Awareness Month, we at Malwarebytes not only pledge to provide the best protection for our customers. We also re-commit ourselves to fostering cybersecurity education and awareness for all.

Categories:

Tags:

(Read more…)

The post Malwarebytes is a champion of National Cybersecurity Awareness Month appeared first on Malwarebytes Labs.

Read more