Assessing the security of a portable router: a look inside its hardware

Credit to Author: Jean Taggart| Date: Mon, 10 Sep 2018 15:00:00 +0000

In this post, we acquire the necessary equipment to analyze the security of an inexpensive portable router, which we access through its diagnostic interface, and poke around inside.

Categories:

Tags:

(Read more…)

The post Assessing the security of a portable router: a look inside its hardware appeared first on Malwarebytes Labs.

Read more

Accelerating technology and domain expertise are the recipe for IT/OT convergence in Oil and Gas

Credit to Author: Vincent Jacquement| Date: Thu, 06 Sep 2018 21:15:38 +0000

As I discussed in my previous blog,  How much value digital transformation has created so far in the Oil & Gas Industry, a debate is currently happening around which IIoT technology… Read more »

The post Accelerating technology and domain expertise are the recipe for IT/OT convergence in Oil and Gas appeared first on Schneider Electric Blog.

Read more

Explained: regular expression (regex)

Credit to Author: Pieter Arntz| Date: Fri, 31 Aug 2018 15:00:53 +0000

What is regular expression (regex) and what makes it vulnerable to attack? Learn how to use regex safely and avoid ReDoS attacks in the process.

Categories:

Tags:

(Read more…)

The post Explained: regular expression (regex) appeared first on Malwarebytes Labs.

Read more

How to secure your content management system

Credit to Author: Pieter Arntz| Date: Thu, 16 Aug 2018 15:00:00 +0000

Popular content management systems are easy to install and use. But how easy is it to keep them secure?

Categories:

Tags:

(Read more…)

The post How to secure your content management system appeared first on Malwarebytes Labs.

Read more

Explained: What is big data?

Credit to Author: Pieter Arntz| Date: Fri, 03 Aug 2018 15:00:00 +0000

In our explained series, we talk about the impact of big data on our society. What is it, who uses it, and for what purposes?

Categories:

Tags:

(Read more…)

The post Explained: What is big data? appeared first on Malwarebytes Labs.

Read more

What’s the real value—and danger—of smart assistants?

Credit to Author: Pieter Arntz| Date: Wed, 18 Jul 2018 20:24:44 +0000

Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they’re dangerous, and other times downright hilarious. What’s the real value in these devices?

Categories:

Tags:

(Read more…)

The post What’s the real value—and danger—of smart assistants? appeared first on Malwarebytes Labs.

Read more

Block all or nothing to prevent ICO fraud?

Credit to Author: Malwarebytes Labs| Date: Thu, 12 Jul 2018 17:00:49 +0000

Unfortunately, most ICOs (Initial Coin Offerings) turn out to be scams. So we feel compelled to ask our customers: would you like us to protect you from aal of them?

Categories:

Tags:

(Read more…)

The post Block all or nothing to prevent ICO fraud? appeared first on Malwarebytes Labs.

Read more