How to fight security fatigue

Credit to Author: Wendy Zamora| Date: Tue, 25 Apr 2017 14:00:55 +0000

We live in the age of the 24-hour news cycle. Each day, whether it’s from TV news, phone notifications, online browsing, social media, or even the good old fashioned paper, we hear stories of the increasing dangers of cybercrime. Cyberthreats are growing more serious! Russian hacker starts his own ransomware service! Experts say tech support…

Categories:

Tags:

(Read more…)

The post How to fight security fatigue appeared first on Malwarebytes Labs.

Read more

3, 2, 1, GO! Make backups of your data!

Credit to Author: Jean Taggart| Date: Wed, 05 Apr 2017 15:00:06 +0000

One of the best defenses against ransomware is having a good backup strategy. Having good backups protects your data against all sorts of unpleasant mishaps. A useful rule of thumb called the “3-2-1 rule”, learn about it here.

Categories:

Tags:

(Read more…)

The post 3, 2, 1, GO! Make backups of your data! appeared first on Malwarebytes Labs.

Read more

Torify and analyze traffic for your VM

Credit to Author: Jérôme Boursier| Date: Thu, 09 Mar 2017 18:00:58 +0000

Several solutions to isolate and analyze a VM network traffic for malware analysis purpose exist. Whonix, Tor and Virtual makes this process painless and efficient.

Categories:

Tags:

(Read more…)

The post Torify and analyze traffic for your VM appeared first on Malwarebytes Labs.

Read more

How do I secure my social media profile?

Credit to Author: William Tsing| Date: Thu, 23 Feb 2017 14:00:07 +0000

Quitting social media entirely can be unrealistic, or at least seriously unfun. So it’s important to take a moment to check out account settings before you start, to make absolutely sure you’re okay with the service’s default settings.

Categories:

Tags:

(Read more…)

Read more