How to secure your content management system

How to secure your content management system

Popular content management systems are easy to install and use. But how easy is it to keep them secure? Categories: Security world Technology Tags: CMSCMS securitycontent management systemsdrupalJoomlawordpress (Read more...) The post How to secure your content management system appeared first on Malwarebytes Labs ... Read More
How to protect your RDP access from ransomware attacks

How to protect your RDP access from ransomware attacks

Ransomware distributors have started using RDP to gain access to business networks. Do you have your remote desktops under control? Categories: Business Security world Tags: businessransomwarerdpremote accessremote desktop protocol (Read more...) The post How to protect your RDP access from ransomware attacks appeared first on Malwarebytes Labs ... Read More
WannaCry Ransomware Infection Heat Map

Explained: What is big data?

In our explained series, we talk about the impact of big data to our society. What is it, who uses it, and for what purposes? Categories: Security world Technology Tags: apopheniabig breachesbig dataInternet of ThingsIoTpersonally identifiable informationPII (Read more...) The post Explained: What is big data? appeared first on Malwarebytes ... Read More

What’s the real value—and danger—of smart assistants?

Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they're dangerous, and other times downright hilarious. What's the real value in these devices? Categories: Security world Technology Tags: alexaassistantcortanadigitaleavesdroppingGooglePieter Arntzsirivirtual (Read more...) The post What’s the real value—and danger—of smart assistants? appeared first on Malwarebytes ... Read More

Can we trust our online project management tools?

Online project management tools can be not only useful, but a lifeline for developers and PMs who juggle multiple tasks with competing deadlines. How can we use them in a secure way? Categories: Business Security world Tags: breachcloudmanagementonline project managementPieter ArntzPMssecurity (Read more...) The post Can we trust our online ... Read More
Did my comment on your blog get lost?

Did my comment on your blog get lost?

Automatic filters on our blog sometimes catch benign comments in their nets. However, they also protect users from spammers, scammers, and malicious links. Read on to learn about our comment policy: what we block and why. Categories: FYI Tags: atm cardsbitcoinsblog commentscrypotocurrencyfor hirehackersIlluminatiMalwarebytesmindless botsmoderatedtech support scamsTSS (Read more...) The post ... Read More
Five easy ways to recognize and dispose of malicious emails

Five easy ways to recognize and dispose of malicious emails

What should you check for to determine if an email is spam or malicious? Here are five red flags to look for—and what to do with those malicious emails when you find them. Categories: How-tos Tags: emailmalspamphishingred flagssafe practicesspamspotting (Read more...) The post Five easy ways to recognize and dispose ... Read More
Tips for safe summer travels: your cybersecurity checklist

Tips for safe summer travels: your cybersecurity checklist

A cybersecurity checklist for when you are about to travel or go on vacation, helps to prevent data-loss and other security issues. Categories: Privacy Security world Tags: backupcybersecurity checklistdata-lossdevicesIoT (Read more...) The post Tips for safe summer travels: your cybersecurity checklist appeared first on Malwarebytes Labs ... Read More
Social media: A treasure trove of spam and scams

Social media: A treasure trove of spam and scams

How do spammers know how to target you for scams? They use social media to produce the most convincing types of spam. Categories: Cybercrime Social engineering Tags: login credentialsnigerianphishphishingPieter Arntzsocial mediaspam (Read more...) The post Social media: A treasure trove of spam and scams appeared first on Malwarebytes Labs ... Read More
SEO poisoning: Is it worth it?

SEO poisoning: Is it worth it?

Is SEO poisoning a thing of the past or are there still effective ways to fool Google's algorithms and rank high in the search results using black hat methods? Categories: Business Hacking Tags: black hat seolink buildingsearch engine optimizationSEOseo poisoning (Read more...) The post SEO poisoning: Is it worth it? ... Read More
Loading...