Keeping your business and personal instant messages secure

Most people want to know their instant messages are securely wrapped up—whether that’s for personal privacy or protecting business communications. There are a lot of solutions out there for better securing IMs.
Categories:

101
How-tos

Ta… Continue reading Keeping your business and personal instant messages secure

You down with P2P? 10 tips to secure your mobile payment app

Peer-to-peer (P2P) mobile transactions are on the rise, thanks to a number of mobile payment apps available on the market. In this post, we’ll look at the security risks of using P2P payment apps and what users can do to protect themselves.
Catego… Continue reading You down with P2P? 10 tips to secure your mobile payment app

10 ways to protect your Android phone

How can Android users balance the power of better tech with the safety of best cybersecurity practices? Here are a few tried and true methods to protect your Android phone.
Categories:

101
How-tos

Tags: Androidandroid securitymobile securitypro… Continue reading 10 ways to protect your Android phone

How to protect your computer from malicious cryptomining

When you experience a slow computer due to malicious cryptomining, how can you troubleshoot it and prevent it from happening again?
Categories:

101
How-tos

Tags: Chrome Task managercrypto-jackinghigh cpupreventslow computertroubleshoot

(Read… Continue reading How to protect your computer from malicious cryptomining

How to remove adware from your PC

Half the battle in avoiding adware is reading install wizards and EULAs very carefully. But let’s be real: no one does that. Here’s how to remove adware from your PC in a few easy steps.
Categories:

101
How-tos

Tags: adwareAdwCleanerhow to remo… Continue reading How to remove adware from your PC

Internet of Things (IoT) security: what is and what should never be

Internet of Things technology may soon multiply in the billions. But security for these devices is practically non-existent. What needs to be done to secure IoT users now and in the future?
Categories:

101
Hacking
How-tos

Tags: Internet of Thin… Continue reading Internet of Things (IoT) security: what is and what should never be

Back to school cybersecurity tips for parents and kids

When you buy your child new devices, it’s important to lay down some ground rules—especially when it comes to security. That’s why we’re providing you with a cybersecurity checklist you can use to prepare your children for the coming school year.

Categories:

Tags:

(Read more…)

The post Back to school cybersecurity tips for parents and kids appeared first on Malwarebytes Labs.

Continue reading Back to school cybersecurity tips for parents and kids

Learning PowerShell: some basic commands

We are going to construct some basic Powershell commands and explain how they work just to show you how useful Powershell can be. For good and for bad.
Categories:
101
How-tos
Tags: certificatescommandsPieter ArntzpowershelltrojanVonteera

(Read more… Continue reading Learning PowerShell: some basic commands