Five unsettling cyberthreats

Credit to Author: William Tsing| Date: Wed, 24 May 2017 18:39:46 +0000

Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. Here are 5 cyberthreats that if you’re not frightened by, you should be.

Categories:

Tags:

(Read more…)

The post Five unsettling cyberthreats appeared first on Malwarebytes Labs.

Read more

5 Unsettling cyberthreats

Credit to Author: William Tsing| Date: Wed, 24 May 2017 18:39:46 +0000

Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. Here are 5 cyberthreats that if you’re not frightened by, you should be.

Categories:

Tags:

(Read more…)

The post 5 Unsettling cyberthreats appeared first on Malwarebytes Labs.

Read more

OWASP Top Ten – Boring security that pays off

Credit to Author: William Tsing| Date: Thu, 04 May 2017 16:00:28 +0000

OWASP recently published a draft list of the top 10 security vulnerabilities of 2017. While intended for developers seeking to code more secure applications, the top 10 list is based on actual survey data of threats seen in the wild and serves as a great starting point for organizations struggling with security priorities. Let’s take a look and see how long they’ve been around prior to publication.

Categories:

Tags:

(Read more…)

The post OWASP Top Ten – Boring security that pays off appeared first on Malwarebytes Labs.

Read more

Mastodon: different social network, additional risks

Credit to Author: Zammis Clark| Date: Tue, 11 Apr 2017 15:00:18 +0000

Learn about the additional risks you can face when using Mastodon, a social network with important differences to traditional ones.

Categories:

Tags:

(Read more…)

The post Mastodon: different social network, additional risks appeared first on Malwarebytes Labs.

Read more