300 shades of gray: a look into free mobile VPN apps

Credit to Author: Jovi Umawing| Date: Tue, 10 Sep 2019 16:41:45 +0000

Mobile VPN apps are one of the best tools for protecting user privacy. Unfortunately, a notable number of are deemed unsafe. Read on to find out how to assess the best mobile VPN for you.

Categories:

Tags:

(Read more…)

The post 300 shades of gray: a look into free mobile VPN apps appeared first on Malwarebytes Labs.

Read more

5 simple steps to securing your remote employees

Credit to Author: David Ruiz| Date: Wed, 04 Sep 2019 14:06:26 +0000

Modern businesses require modern cybersecurity, and modern cybersecurity means more than just implementing the latest tech. It also means implementing good governance.

Categories:

Tags:

(Read more…)

The post 5 simple steps to securing your remote employees appeared first on Malwarebytes Labs.

Read more

Data and device security for domestic abuse survivors

Credit to Author: David Ruiz| Date: Tue, 13 Aug 2019 16:33:22 +0000

Many domestic abuse survivors need help before stalkerware strikes. Here, we give basic advice on device security and protecting sensitive data.

Categories:

Tags:

(Read more…)

The post Data and device security for domestic abuse survivors appeared first on Malwarebytes Labs.

Read more

Backdoors are a security vulnerability

Credit to Author: David Ruiz| Date: Fri, 09 Aug 2019 16:10:27 +0000

Upset by their inability to access potentially vital evidence for criminal investigations, the federal government has, for years, pushed to convince tech companies to build backdoors that will, allegedly, only be used by law enforcement agencies. The problem, cybersecurity researchers say, is that those backdoors can easily be exploited by criminals.

Categories:

Tags:

(Read more…)

The post Backdoors are a security vulnerability appeared first on Malwarebytes Labs.

Read more

MegaCortex Returns…

Credit to Author: Shriram Munde| Date: Tue, 30 Jul 2019 07:27:12 +0000

MegaCortex, a ransomware which was first spotted in January this year, has become active again and has changed the way it previously attacked/targeted the corporate world. In order to simplify its execution and increase its scale of operation, it uses ‘Command Prompt’ instead of ‘PowerShell’ in current targeted campaign. Key…

Read more

How to securely send your personal information

Credit to Author: Seth Rosenblatt| Date: Mon, 08 Jul 2019 16:00:00 +0000

On its own, email is not safe for sending credit card or passport numbers. Here’s how to securely send personal information over the Internet.

Categories:

Tags:

(Read more…)

The post How to securely send your personal information appeared first on Malwarebytes Labs.

Read more