All 101 Cybercrime Malwarebytes news PUP Security world Threat analysis

April 24, 2018 - Sophisticated social engineering. Fileless malware. Specialized Trojans. These are the threats that keep the financial sector on its toes—making way for a new mode of authentication called behavioral biometrics. And its primary concern is not what your credentials are but how you enter them.

CONTINUE READINGNo Comments

April 20, 2018 - Is it worth your time to change your default DNS servers? That depends on your wishes and whether you can gains some speed.

CONTINUE READINGNo Comments

April 17, 2018 - If retailers think they already have much to worry about, they have another thing coming— cybersecurity—and it's no longer something they can keep on the back burner. This piece helps retailers ask the right cybersecurity questions to protect their businesses.

CONTINUE READINGNo Comments

April 11, 2018 - Most people want to know their instant messages are securely wrapped up—whether that's for personal privacy or protecting business communications. There are a lot of solutions out there for better securing IMs.

CONTINUE READINGNo Comments

April 6, 2018 - In this final installment of "Physician, protect thyself," we take a look at two key roles in small- to medium-sized hospitals and outpatient clinics that must step up their cybersecurity game to protect patients and staff alike.

CONTINUE READINGNo Comments

March 30, 2018 - Peer-to-peer (P2P) mobile transactions are on the rise, thanks to a number of mobile payment apps available on the market. In this post, we'll look at the security risks of using P2P payment apps and what users can do to protect themselves.

CONTINUE READINGNo Comments

March 29, 2018 - By now it’s obvious that data security technology hasn’t kept pace with the needs of consumers. In 2017 alone, we learned about massive data breaches from major organizations like Equifax, Uber, and Verizon. In other words: We’re in the midst of a data breach epidemic.

CONTINUE READINGNo Comments

March 28, 2018 - How can Android users balance the power of better tech with the safety of best cybersecurity practices? Here are a few tried and true methods to protect your Android phone.

CONTINUE READINGNo Comments

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language