5 simple steps to securing your remote employees

Credit to Author: David Ruiz| Date: Wed, 04 Sep 2019 14:06:26 +0000

Modern businesses require modern cybersecurity, and modern cybersecurity means more than just implementing the latest tech. It also means implementing good governance.

Categories:

Tags:

(Read more…)

The post 5 simple steps to securing your remote employees appeared first on Malwarebytes Labs.

Read more

Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks

Credit to Author: Jovi Umawing| Date: Wed, 21 Aug 2019 15:56:45 +0000

Researchers called it KNOB, a clever attack against the firmware of a Bluetooth chip that can allow hackers to successfully hijack paired devices and steal their sensitive data. Are users at risk?

Categories:

Tags:

(Read more…)

The post Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks appeared first on Malwarebytes Labs.

Read more

Of hoodies and headphones: a spotlight on risks surrounding audio output devices

Credit to Author: Jovi Umawing| Date: Mon, 22 Apr 2019 18:15:34 +0000

For years, researchers have been poking holes in our audio output devices in the name of security and privacy. They’ve found many ways our headphones can be hacked or otherwise compromised. Learn what they discovered, and how you can secure your own.

Categories:

Tags:

(Read more…)

The post Of hoodies and headphones: a spotlight on risks surrounding audio output devices appeared first on Malwarebytes Labs.

Read more