Explained: regular expression (regex)
What is regular expression (regex) and what makes it vulnerable to attack? Learn how to use regex safely and avoid ReDoS attacks in the process. Categories: Business Technology Tags: ddosJavaScriptnode.jsredosregexsearchservervulnerability (Read more...) The post Explained: regular expression (regex) appeared first on Malwarebytes Labs ... Read More
Can search extensions keep your searches private?
A lot of search extensions have been marketed over the year claiming to protect online privacy. Are they worth installing? We take a look at what these plugins actually have to offer. Categories: PUP Tags: chromeextensionsprivacysearchsearchalgowowmovix (Read more...) The post Can search extensions keep your searches private? appeared first on ... Read More
How to secure your content management system
Popular content management systems are easy to install and use. But how easy is it to keep them secure? Categories: Security world Technology Tags: CMSCMS securitycontent management systemsdrupalJoomlawordpress (Read more...) The post How to secure your content management system appeared first on Malwarebytes Labs ... Read More
How to protect your RDP access from ransomware attacks
Ransomware distributors have started using RDP to gain access to business networks. Do you have your remote desktops under control? Categories: Business Security world Tags: businessransomwarerdpremote accessremote desktop protocol (Read more...) The post How to protect your RDP access from ransomware attacks appeared first on Malwarebytes Labs ... Read More
Explained: What is big data?
In our explained series, we talk about the impact of big data to our society. What is it, who uses it, and for what purposes? Categories: Security world Technology Tags: apopheniabig breachesbig dataInternet of ThingsIoTpersonally identifiable informationPII (Read more...) The post Explained: What is big data? appeared first on Malwarebytes ... Read More
What’s the real value—and danger—of smart assistants?
Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they're dangerous, and other times downright hilarious. What's the real value in these devices? Categories: Security world Technology Tags: alexaassistantcortanadigitaleavesdroppingGooglePieter Arntzsirivirtual (Read more...) The post What’s the real value—and danger—of smart assistants? appeared first on Malwarebytes ... Read More
Can we trust our online project management tools?
Online project management tools can be not only useful, but a lifeline for developers and PMs who juggle multiple tasks with competing deadlines. How can we use them in a secure way? Categories: Business Security world Tags: breachcloudmanagementonline project managementPieter ArntzPMssecurity (Read more...) The post Can we trust our online ... Read More
Did my comment on your blog get lost?
Automatic filters on our blog sometimes catch benign comments in their nets. However, they also protect users from spammers, scammers, and malicious links. Read on to learn about our comment policy: what we block and why. Categories: FYI Tags: atm cardsbitcoinsblog commentscrypotocurrencyfor hirehackersIlluminatiMalwarebytesmindless botsmoderatedtech support scamsTSS (Read more...) The post ... Read More
Five easy ways to recognize and dispose of malicious emails
What should you check for to determine if an email is spam or malicious? Here are five red flags to look for—and what to do with those malicious emails when you find them. Categories: How-tos Tags: emailmalspamphishingred flagssafe practicesspamspotting (Read more...) The post Five easy ways to recognize and dispose ... Read More
Tips for safe summer travels: your cybersecurity checklist
A cybersecurity checklist for when you are about to travel or go on vacation, helps to prevent data-loss and other security issues. Categories: Privacy Security world Tags: backupcybersecurity checklistdata-lossdevicesIoT (Read more...) The post Tips for safe summer travels: your cybersecurity checklist appeared first on Malwarebytes Labs ... Read More

