Explained: the cloud

Credit to Author: Pieter Arntz| Date: Tue, 14 Nov 2017 18:24:53 +0000

The cloud. What is it? What are the pros and cons, and how can we make it as safe as possible? This post covers the basics.

Categories:

Tags:

(Read more…)

The post Explained: the cloud appeared first on Malwarebytes Labs.

Read more

Out of character: Homograph attacks explained

Credit to Author: Malwarebytes Labs| Date: Fri, 06 Oct 2017 15:00:10 +0000

Online and on traditional media, we hear and read about different kinds of cybersecurity attacks that sometimes we get overwhelmed with the terminologies. Most of us grasp what phishing attacks and denial of service (DoS) attacks are, but how familiar are we wit

Categories:

Tags:

(Read more…)

The post Out of character: Homograph attacks explained appeared first on Malwarebytes Labs.

Read more

Explained: YARA rules

Credit to Author: Pieter Arntz| Date: Fri, 15 Sep 2017 15:00:08 +0000

YARA is a tool that can be used to identify files that meet certain conditions. It is mainly in use by security researchers to classify malware.

Categories:

Tags:

(Read more…)

The post Explained: YARA rules appeared first on Malwarebytes Labs.

Read more

Explained: False positives

Credit to Author: Pieter Arntz| Date: Thu, 07 Sep 2017 15:00:21 +0000

False positives are alarms for non-specific files or behavior that is flagged as malicious, while in fact there were no bad intentions present.

Categories:

Tags:

(Read more…)

The post Explained: False positives appeared first on Malwarebytes Labs.

Read more

Explained: the Dark Web

Credit to Author: Pieter Arntz| Date: Wed, 26 Jul 2017 17:00:33 +0000

How is the Dark Web different from the regular internet? We unravel a few misconceptions to bring you closer to the truth.

Categories:

Tags:

(Read more…)

The post Explained: the Dark Web appeared first on Malwarebytes Labs.

Read more