Tackling the myths surrounding cyberbullying

Misconceptions abound when it comes to cyberbullying. In this post, we’ll identify six of these “myths” and then explain why they’re worth discrediting.
Categories:
101
FYI
Tags: child security onlinecyberbullyingmisconceptionsmythsonline bullyingonl… Continue reading Tackling the myths surrounding cyberbullying

Interview with a malware hunter: Pieter Arntz

Welcome to our new series: interview with a malware hunter. In these Q&A sessions, we’ll take you behind the scenes to get to know our malware intelligence crew.

Categories:

Tags:

(Read more…)

The post Interview with a malware hunter: Pieter Arntz appeared first on Malwarebytes Labs.

Continue reading Interview with a malware hunter: Pieter Arntz

Privacy Awareness Week: A primer

The Asia Pacific Privacy Authorities (APPA) began an initiative called Privacy Awareness Week, or PAW, with the purpose of educating users about current privacy issues and promoting the importance of keeping their personal information safe. This remai… Continue reading Privacy Awareness Week: A primer

Why you don’t need 27 different passwords

People have to remember an average of 27 different passwords today—and they need to be long, not obvious, have special characters, and you can’t write them down. We’re here to tell you: stop doing that. Here’s how you can protect your data and your sanity without having to remember all those passwords.

Categories:

Tags:

(Read more…)

The post Why you don’t need 27 different passwords appeared first on Malwarebytes Labs.

Continue reading Why you don’t need 27 different passwords

What are exploits? (And why you should care)

At one point in the not-so-distant past, exploits were responsible for delivering 80 percent of malware to people’s systems. But exploits seem to be experiencing a lull today. Does this mean they’re gone for good or is this simply the calm before the storm? Let’s break down this stealthy threat so you can not only know your enemy, but also be appropriately prepared should the exploit attacks return.

Categories:

Tags:

(Read more…)

The post What are exploits? (And why you should care) appeared first on Malwarebytes Labs.

Continue reading What are exploits? (And why you should care)

Understanding the basics of Two-Factor Authentication

With data breaches resulting in leaked passwords occurring almost daily, two-factor authentication has become an essential tool in the security toolkit.Categories: 101
FYITags: 2faauthenticationmfaMulti-Factor AuthorizationpasswordsPieter Arntzssotoke… Continue reading Understanding the basics of Two-Factor Authentication