Cookies: Should I worry about them?

Are cookies a threat? The answer depends on how much you care about privacy. Learn how to manage cookies and stay in control of your data.
Categories:

101
Privacy

Tags: browsercachecookiesevercookiesflashsilverlightsupercookiesvideo plug ins

Continue reading Cookies: Should I worry about them?

Free tools: Internet traffic monitoring

There are many reasons why you might want to start Internet traffic monitoring, especially if you’re a security enthusiast or amateur analyst. We list some free tools that have different use cases.
Categories:

101
Technology

Tags: bitmeterfiddl… Continue reading Free tools: Internet traffic monitoring

Free tools: Internet traffic monitoring

There are many reasons why you might want to start Internet traffic monitoring, especially if you’re a security enthusiast or amateur analyst. We list some free tools that have different use cases.
Categories:

101
Technology

Tags: bitmeterfiddl… Continue reading Free tools: Internet traffic monitoring

A state of constant uncertainty or uncertain constancy? Fast flux explained

Although often seen as an illegal cybercriminal tactic, the methodology behind fast flux is actually far from evil. So how is it being abused? Read on to learn more.
Categories:

101
FYI

Tags: botnetC&Ccardingfast fluxfast flux agentIP fluxk… Continue reading A state of constant uncertainty or uncertain constancy? Fast flux explained

Internet of Things (IoT) security: what is and what should never be

Internet of Things technology may soon multiply in the billions. But security for these devices is practically non-existent. What needs to be done to secure IoT users now and in the future?
Categories:

101
Hacking
How-tos

Tags: Internet of Thin… Continue reading Internet of Things (IoT) security: what is and what should never be

Explained: the cloud

The cloud. What is it? What are the pros and cons, and how can we make it as safe as possible? This post covers the basics.
Categories:

101
FYI

Tags: cloudcomplianceExplainediaasmultiplepaasprivate hybridpublicsecurity

(Read more…)

T… Continue reading Explained: the cloud

Singles’ Day deal seekers beware

Originally a day set aside for singles in China to be proud of their singlehood, Singles’ Day has been transformed into what is arguably the world’s single largest e-commerce festival, thanks to the involvement of The Alibaba Group. In fact, the Alibaba Group alone reported $17.8 billion in sales; six times higher than what was…

Categories:

Tags:

(Read more…)

The post Singles’ Day deal seekers beware appeared first on Malwarebytes Labs.

The post Singles’ Day deal seekers beware appeared first on Security Boulevard.

Continue reading Singles’ Day deal seekers beware

Part 2: All rise! Mind these digital crimes and arm your business against them

In the first installment of this two-part series, we saw several crimes consumers should make sure they are on top of to significantly lessen the chances of encountering them in the future. For this post, we’re going to look into each digital crimes that keep small businesses and large enterprises up on their toes. No, we don’t have Advanced Persistent Threats (APTs) in the list. Yet.

Categories:

Tags:

(Read more…)

The post Part 2: All rise! Mind these digital crimes and arm your business against them appeared first on Malwarebytes Labs.

The post Part 2: All rise! Mind these digital crimes and arm your business against them appeared first on Security Boulevard.

Continue reading Part 2: All rise! Mind these digital crimes and arm your business against them

Explained: blockchain technology

Continuing education about cryptocurrency, we provide some insight into the technology behind blockchain and explain what makes it secure.
Categories:

101
FYI

Tags: bitcoinblockchainminernodeproof of stakeproof of worksmart contracts

(Read m… Continue reading Explained: blockchain technology