Cloud data protection: how to secure what you store in the cloud

With robust security measures and a healthy dose of general internet safety guidelines, cloud storage can be as secure as any other option on the market.

Categories:

Tags:

(Read more…)

The post Cloud data protection: how to secure what you store in the cloud appeared first on Malwarebytes Labs.

Keep Zoombombing cybercriminals from dropping a load on your meetings

In a zeitgeisty moment, Zoom has become the web conference tool of choice for everyone. Unfortunately, cybercriminals are taking note and Zoombooming the public. We show readers how to protect against this intrusion of privacy.

Categories:

Tags:

(Read more…)

The post Keep Zoombombing cybercriminals from dropping a load on your meetings appeared first on Malwarebytes Labs.

How to prevent a rootkit attack

Rootkit attacks are considered one of the most dangerous cyberthreats today. Learn what they are, how they infect systems, and how to protect against them.

Categories:

Tags:

(Read more…)

The post How to prevent a rootkit attack appeared first on Malwarebytes Labs.

Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press

When it comes to cybersecurity, journalists need to protect themselves, their sources, and the freedom of the press. Which methods should they use?

Categories:

Tags:

(Read more…)

The post Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press appeared first on Malwarebytes Labs.

How to protect yourself from doxing

Doxing, or collecting and spreading private information about a user online, is a form of cyber harassment, stalking, and even a potential threat to physical safety. Here’s what you can do to protect yourself against it.

Categories:

Tags:

(Read more…)

The post How to protect yourself from doxing appeared first on Malwarebytes Labs.

Everything you need to know about ATM attacks and fraud: Part 1

If you’re familiar with skimming, you may have also heard of shimming, card trapping, and cash trapping. These are attacks and scams targeted at ATMs. Part 1 of our series explores various ATM attack scenarios and explains what users should look out for when using an ATM.

Categories:

Tags:

(Read more…)

The post Everything you need to know about ATM attacks and fraud: Part 1 appeared first on Malwarebytes Labs.

Employee education strategies that work to change behavior

Using technology alone to combat cyberattacks is not enough. That’s why employee education on security awareness should be an integral part of any company’s cybersecurity policy.

Categories:

Tags:

(Read more…)

The post Employee education strategies that work to change behavior appeared first on Malwarebytes Labs.

The lazy person’s guide to cybersecurity: minimum effort for maximum protection

How can we help our less tech-savvy friends stay more secure online? By giving them a lazy person’s guide to cybersecurity, we can offer maximum protection for minimal effort.

Categories:

Tags:

(Read more…)

The post The lazy person’s guide to cybersecurity: minimum effort for maximum protection appeared first on Malwarebytes Labs.

Should you delete yourself from social media?

All the recent news—from Facebook’s Cambridge Analytica snafu to various abuses of Twitter vulnerabilities—has you wondering: Should I delete myself from social media? We provide advice and links on how to tighten security if you want to cool down, or, if you’re ready to go nuclear, delete yourself permanently.

Categories:

Tags:

(Read more…)

The post Should you delete yourself from social media? appeared first on Malwarebytes Labs.