Blockchain technology: not just for cryptocurrency

We’ve talked about how cryptocurrency uses blockchain technology. Now we take a closer look at its other applications, and why blockchain is on the brink of changing the world.
Categories:

Security world
Technology

Tags: blockchaindecentralized… Continue reading Blockchain technology: not just for cryptocurrency

Terdot Trojan likes social media

The Terdot Trojan is a banker, but it loves to steal your social networks credentials as well.
Categories:

Malware
Malwarebytes news
Threat analysis

Tags: bankerfacebooksocial mediaterdottrojantwitter

(Read more…)

The post Terdot Tro… Continue reading Terdot Trojan likes social media

How the EU intends to battle fake news

The EU has announced to launch of a public consultation and the setup of a high-level expert group in the battle against fake news and online disinformation.
Categories:

Government
Social engineering

Tags: EUfake newshigh level experts grouponl… Continue reading How the EU intends to battle fake news

When you shouldn’t trust a trusted root certificate

A trusted root certificate is the cornerstone of authentication and security in software and on the Internet. But even this can be abused by criminals. Learn when you shouldn’t trust these trusted sources.

Categories:

Tags:

(Read more…)

The post When you shouldn’t trust a trusted root certificate appeared first on Malwarebytes Labs.

The post When you shouldn’t trust a trusted root certificate appeared first on Security Boulevard.

Continue reading When you shouldn’t trust a trusted root certificate

Explained: the cloud

The cloud. What is it? What are the pros and cons, and how can we make it as safe as possible? This post covers the basics.
Categories:

101
FYI

Tags: cloudcomplianceExplainediaasmultiplepaasprivate hybridpublicsecurity

(Read more…)

T… Continue reading Explained: the cloud

Explained: blockchain technology

Continuing education about cryptocurrency, we provide some insight into the technology behind blockchain and explain what makes it secure.
Categories:

101
FYI

Tags: bitcoinblockchainminernodeproof of stakeproof of worksmart contracts

(Read m… Continue reading Explained: blockchain technology

Digital forensics: How to recover deleted files

What happens exactly when you delete a file, and how easy or hard is it to recover deleted files? Learn the differences between delete, erase, and overwrite according to digital forensics.
Categories:

Security world
Technology

Tags: deleteerase… Continue reading Digital forensics: How to recover deleted files

Exhibition: it-sa Nuremberg

Malwarebytes attends it-sa in Germany—Europe’s largest expo for IT security. Post written in English and German.

Categories:

Tags:

(Read more…)

The post Exhibition: it-sa Nuremberg appeared first on Malwarebytes Labs.

The post Exhibition: it-sa Nuremberg appeared first on Security Boulevard.

Continue reading Exhibition: it-sa Nuremberg

Facebook worries: I didn’t post that

What could have happened when you find Facebook posts or messages that you didn’t post or send? And what are the actions you can take to prevent further abuse?

Categories:

Tags:

(Read more…)

The post Facebook worries: I didn’t post that appeared first on Malwarebytes Labs.

Continue reading Facebook worries: I didn’t post that