All 101 Cybercrime Malwarebytes news PUP Security world Threat analysis

November 21, 2018 - Deepfake is a machine learning technique that is capable of perfect imitations of facial expressions in videos. Will adding voice imitations to them lead to the perfect scam?

CONTINUE READINGNo Comments

November 9, 2018 - A quick introduction to Process Hacker which is a powerful tool that can be used for troubleshooting, debugging, and reverse engineering.

CONTINUE READINGNo Comments

October 17, 2018 - FIDO, which stands for Fast Identity Online, is set of standards that enable simpler and more secure user authentication across websites and mobile services. Does this mean the end of passwords? Time will tell.

CONTINUE READINGNo Comments

October 16, 2018 - Attention makers! Are you looking for a challenging project that not only gets your gears grinding but helps to keep you secure while traveling? Welcome to the build-your-own security camera tutorial.

CONTINUE READINGNo Comments

October 2, 2018 - We know about BYOD. What about BYOS? Is it a good idea to Bring Your Own Security, or use your own security solution on devices that you use for work? What if they are company owned? We walk companies and employees through the pros and cons of each.

CONTINUE READINGNo Comments

September 25, 2018 - Safari has begun blocking legacy extensions installed from outside the Extensions Gallery. Unfortunately, implementation of this policy has been abrupt, with little explanation for users on why their extensions are being yanked. Let's look at how Apple's new policy and how its application impacts security.

CONTINUE READINGNo Comments

September 10, 2018 - In this post, we acquire the necessary equipment to analyze the security of an inexpensive portable router, which we access through its diagnostic interface, and poke around inside.

CONTINUE READINGNo Comments

August 31, 2018 - What is regular expression (regex) and what makes it vulnerable to attack? Learn how to use regex safely and avoid ReDoS attacks in the process.

CONTINUE READINGNo Comments

August 16, 2018 - Popular content management systems are easy to install and use. But how easy is it to keep them secure?

CONTINUE READINGNo Comments

August 3, 2018 - In our explained series, we talk about the impact of big data on our society. What is it, who uses it, and for what purposes?

CONTINUE READINGNo Comments

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language