Free tools: Internet traffic monitoring

Credit to Author: Pieter Arntz| Date: Thu, 14 Dec 2017 19:40:09 +0000

There are many reasons why you might want to start Internet traffic monitoring, especially if you’re a security enthusiast or amateur analyst. We list some free tools that have different use cases.

Categories:

Tags:

(Read more…)

The post Free tools: Internet traffic monitoring appeared first on Malwarebytes Labs.

Read more

How cryptocurrency mining works: Bitcoin vs. Monero

Credit to Author: Pieter Arntz| Date: Mon, 11 Dec 2017 16:00:08 +0000

Why threat actors prefer mining for Monero rather than for the very hot Bitcoin cryptocurrency? Let us point out some possible reasons.

Categories:

Tags:

(Read more…)

The post How cryptocurrency mining works: Bitcoin vs. Monero appeared first on Malwarebytes Labs.

Read more

How to harden AdwCleaner’s web backend using PHP

Credit to Author: Jérôme Boursier| Date: Wed, 06 Dec 2017 16:00:28 +0000

More and more applications are moving from desktop to the web, where they are particularly exposed to security risks. They are often tied to a database backend, and thus need to be properly secured, even though most of the time they are designed to restrict access to authenticated users only. PHP is used to develop…

Categories:

Tags:

(Read more…)

The post How to harden AdwCleaner’s web backend using PHP appeared first on Malwarebytes Labs.

Read more

Blockchain technology: not just for cryptocurrency

Credit to Author: Pieter Arntz| Date: Tue, 05 Dec 2017 18:20:53 +0000

We’ve talked about how cryptocurrency uses blockchain technology. Now we take a closer look at its other applications, and why blockchain is on the brink of changing the world.

Categories:

Tags:

(Read more…)

The post Blockchain technology: not just for cryptocurrency appeared first on Malwarebytes Labs.

Read more

When you shouldn’t trust a trusted root certificate

Credit to Author: Pieter Arntz| Date: Thu, 16 Nov 2017 17:30:00 +0000

A trusted root certificate is the cornerstone of authentication and security in software and on the Internet. But even this can be abused by criminals. Learn when you shouldn’t trust these trusted sources.

Categories:

Tags:

(Read more…)

The post When you shouldn’t trust a trusted root certificate appeared first on Malwarebytes Labs.

Read more