Child identity theft, part 1: On familiar fraud

Credit to Author: Jovi Umawing| Date: Tue, 03 Mar 2020 20:17:19 +0000

In this two-part series on child identity theft, we shed light on the growing problem of familiar fraud, where those entrusted with a minor’s information are the very ones who abuse it.

Categories:

Tags:

(Read more…)

The post Child identity theft, part 1: On familiar fraud appeared first on Malwarebytes Labs.

Read more

Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack

Credit to Author: Sam Chester| Date: Fri, 14 Feb 2020 17:32:10 +0000

We take a look at some of the most famous (or infamous) hacking scenes from TV and movies and the cybersecurity lessons, if any, we can learn from them.

Categories:

Tags:

(Read more…)

The post Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack appeared first on Malwarebytes Labs.

Read more

A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s

Credit to Author: Malwarebytes Labs| Date: Thu, 19 Dec 2019 18:03:33 +0000

As the 2010s come to a close, we take a snarky walk down memory lane, listing the craziest, most impactful, or simply just awful cybersecurity fails of the decade.

Categories:

Tags:

(Read more…)

The post A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s appeared first on Malwarebytes Labs.

Read more

Report: Organizations remain vulnerable to increasing insider threats

Credit to Author: Jovi Umawing| Date: Thu, 05 Dec 2019 16:00:00 +0000

The risk and challenges insider threats pose to organizations are ever present, even before tech as we know it existed. The age of digitization only made it higher and far-reaching. How has insider threats evolved over time? Where are we now in terms of mitigating insider threat risk? Are businesses really doing something about it? We answer such questions—and more—in this post.

Categories:

Tags:

(Read more…)

The post Report: Organizations remain vulnerable to increasing insider threats appeared first on Malwarebytes Labs.

Read more

As Internet turns 50, more risks and possibilities emerge

Credit to Author: Akshay Bhargava| Date: Tue, 29 Oct 2019 15:00:00 +0000

The world as we know it changed on October 29, 1969, the day the Internet was born. 50 years later, it’s both ubiquitous and full of potential—and risks.

Categories:

Tags:

(Read more…)

The post As Internet turns 50, more risks and possibilities emerge appeared first on Malwarebytes Labs.

Read more

When can we get rid of passwords for good?

Credit to Author: Pieter Arntz| Date: Wed, 16 Oct 2019 20:17:19 +0000

Passwords are a burden and security risk, especially when used as a single authentication method. Can we get rid of passwords once and for all? We list alternative authentication methods and discuss their pros and cons.

Categories:

Tags:

(Read more…)

The post When can we get rid of passwords for good? appeared first on Malwarebytes Labs.

Read more

Europol: Ransomware remains top threat in IOCTA report

Credit to Author: Malwarebytes Labs| Date: Mon, 14 Oct 2019 16:00:00 +0000

The European Union Agency for Law Enforcement Cooperation, or Europol, just released its annual Internet Organized Crime Threat Assessment (IOCTA) report. We highlight their key findings and remind readers how to better protect themselves.

Categories:

Tags:

(Read more…)

The post Europol: Ransomware remains top threat in IOCTA report appeared first on Malwarebytes Labs.

Read more