Please don’t buy this: identity theft protection services

Identity theft protection services promise to have your back against cybercriminals looking to steal your data. But they don’t actually stop them from taking your identity. Are they worth it, then? We say no.
Categories:

Cybercrime
Privacy

Tags… Continue reading Please don’t buy this: identity theft protection services

Please don’t buy this: smart locks

The announcement of Amazon Key, a smart lock paired with a security camera that lets couriers into your home, spawned our new series called “Please don’t buy this.”

Categories:

Tags:

(Read more…)

The post Please don’t buy this: smart locks appeared first on Malwarebytes Labs.

The post Please don’t buy this: smart locks appeared first on Security Boulevard.

Continue reading Please don’t buy this: smart locks

Nigerian scams without the Nigerians

Many in the United States are familiar with Nigerian scams, but what kind of scams are going on in non-English countries? Take a look at the Chinese version – the seminar scam.

Categories:

Tags:

(Read more…)

The post Nigerian scams without the Nigerians appeared first on Malwarebytes Labs.

Continue reading Nigerian scams without the Nigerians

Going dark: encryption and law enforcement

There’s been a lot of talk recently about encryption and how law enforcement can’t convict criminals without encryption keys. We beg to differ.
Categories:
Government
Privacy
Security world
Tags: backdoorencryptiongovernmentlaw enforcementprivacy

(R… Continue reading Going dark: encryption and law enforcement

Please stop posting your X-rays to social media

Many people post unredacted medical images to Twitter and Instagram. They shouldn’t because the details included on the image often can compromise personal identity online and in rare instances, lead to a possible attack on an exposed piece of medical… Continue reading Please stop posting your X-rays to social media

Tech support scams: what are other people doing?

We’ve talked a lot about tech support scams over the past few years, typically focused on what we see ourselves, and the scammers who like to pose as Malwarebytes. But tech support scams are much bigger than that, targeting every tech company under the sun. So what are other people doing about it? Let’s take a look at some of the other players working to keep you safe.

Categories:

Tags:

(Read more…)

The post Tech support scams: what are other people doing? appeared first on Malwarebytes Labs.

Continue reading Tech support scams: what are other people doing?

OWASP Top Ten – Boring security that pays off

OWASP recently published a draft list of the top 10 security vulnerabilities of 2017. While intended for developers seeking to code more secure applications, the top 10 list is based on actual survey data of threats seen in the wild and serves as a great starting point for organizations struggling with security priorities. Let’s take a look and see how long they’ve been around prior to publication.

Categories:

Tags:

(Read more…)

The post OWASP Top Ten – Boring security that pays off appeared first on Malwarebytes Labs.

Continue reading OWASP Top Ten – Boring security that pays off

Amazon third party sellers: A new threat

On Monday, the Wall Street Journal reported a wave of hijacked Amazon seller accounts that proceeded to fleece buyers for large sums of money. As reported here, attackers would use credentials harvested from other breaches to take over the account, th… Continue reading Amazon third party sellers: A new threat