The enemy is us: a look at insider threats

Credit to Author: Jovi Umawing| Date: Mon, 20 Aug 2018 16:42:50 +0000

It could be the engineer in the IT department, the janitor mopping the lobby, one of the many managers two floors up, or the contractor who’s been in and out the office for weeks now. Or, maybe it could be you. It could be the engineer in the IT department, the janitor mopping the lobby, one of the many managers two floors up, or the contractor who’s been in and out the office for weeks now. Or, maybe it could be you. Who are the insider threats to organizations? And how can they be stopped?

Categories:

Tags:

(Read more…)

The post The enemy is us: a look at insider threats appeared first on Malwarebytes Labs.

Read more

Back to school cybersecurity: hints, tips, and links for a safer school year

Credit to Author: Malwarebytes Labs| Date: Tue, 14 Aug 2018 15:00:00 +0000

Term time is upon us once more, and soon the summer holidays will be a thing of the past. We offer up some handy hints and tips for better back to school cybersecurity, and link to numerous resources of our own to help parents and kids have a safer online experience this year.

Categories:

Tags:

(Read more…)

The post Back to school cybersecurity: hints, tips, and links for a safer school year appeared first on Malwarebytes Labs.

Read more

8 everyday technologies that can make you vulnerable to cyberattacks

Credit to Author: Kayla Matthews| Date: Thu, 09 Aug 2018 15:00:00 +0000

The security vulnerabilities of the latest developments in tech have been well documented. But what about everyday technologies that have been around for a while or are widely adopted? Here are eight commonly-used tech conveniences that are not as ironclad as you might hope.

Categories:

Tags:

(Read more…)

The post 8 everyday technologies that can make you vulnerable to cyberattacks appeared first on Malwarebytes Labs.

Read more

The danger of third parties: ads, pipelines, and plugins

Credit to Author: Christopher Boyd| Date: Fri, 20 Jul 2018 15:00:00 +0000

We take a look at the perils of the tools and services embedded into the websites you use on a daily basis, thanks to the development help of third parties.

Categories:

Tags:

(Read more…)

The post The danger of third parties: ads, pipelines, and plugins appeared first on Malwarebytes Labs.

Read more

A primer: How to stay safe on Amazon Prime Day

Credit to Author: Jovi Umawing| Date: Sun, 15 Jul 2018 17:34:53 +0000

While Amazon is poised for its fourth annual Prime Day, the e-commerce giant’s flash sales event for Prime members, shoppers on the hunt for deals may get more than they bargained for—malware. Here’s what you need to keep in mind to stay secure while you shop.

Categories:

Tags:

(Read more…)

The post A primer: How to stay safe on Amazon Prime Day appeared first on Malwarebytes Labs.

Read more

A primer: How to stay safe on Amazon’s Prime Day Sale

Credit to Author: Jovi Umawing| Date: Sun, 15 Jul 2018 17:34:53 +0000

While Amazon is poised for its fourth year run of Prime Day, the e-commerce giant’s annual flash sales event for Prime members, shoppers on the hunt for bargain deals are ready and revving, too. But before you review your shopping list, let us first review some points we need to keep in mind to stay secure whilst we shop.

Categories:

Tags:

(Read more…)

The post A primer: How to stay safe on Amazon’s Prime Day Sale appeared first on Malwarebytes Labs.

Read more

When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained

Credit to Author: Jovi Umawing| Date: Thu, 12 Jul 2018 16:42:06 +0000

Maybe it’s the quirky way some tech writers abbreviate it, or the surreal way it reminded you of that popular Michael Jackson song. Whatever triggers you to remember the term, for most of us, man-in-the-middle embodies something both familiar yet mysterious. Let’s get to know this threat a little bit better, shall we?

Categories:

Tags:

(Read more…)

The post When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained appeared first on Malwarebytes Labs.

Read more

So you’ve been asked to start a threat intel program

Credit to Author: William Tsing| Date: Tue, 10 Jul 2018 15:00:00 +0000

What are the bumps in the road you can expect and avoid when setting up a threat intel progarm for your business?

Categories:

Tags:

(Read more…)

The post So you’ve been asked to start a threat intel program appeared first on Malwarebytes Labs.

Read more