<
>

Who's Zooming who? Guidelines on how to use Zoom safely

By: Omri Herscovici, Vulnerability Research Team Lead at Check Point Software Technologies In recent weeks, the COVID-19 crisis has meant that millions of people are staying at home instead of going to work or meeting up...

Criminals hack Tupperware website with credit card skimmer

Authored by: Jérôme Segura, Malwarebytes Labs On March 20, Malwarebytes identified a targeted cyberattack against household brand Tupperware and its associated websites that is still active today. We...

Two common misconceptions about biometrics

Authored By: Andrew Shikiar, Executive Director & CMO, FIDO Alliance   The surge in smart home integration is slowly taking over cosmopolitan Asia. By 2024, around 96.4 million households across the region are...

Nine Tips to Securely Work from Home During Coronavirus

Authored by: Dean Coclin, Senior Director of Business Development at DigiCert     Even before the coronavirus outbreak, employees were increasingly working from home. Since the World Health Organization declared...

Cyber Security in the New Age of Rail

Authored by: Ling Fang, Senior Vice President, Asia Pacific, Alstom We tend to take our personal safety for granted when travelling by rail, whether it’s our daily metro commute or a cross-border journey by high...

Cybercriminals impersonate World Health Organization to distribute fake coronavirus e-book

Authored by: Malwarebytes Threat Intelligence Team The number of scams, threats, and malware campaigns taking advantage of public concern over the coronavirus is increasing each day. As a result, we’ve been...

DNS Security – The Key Hidden Component for the COVID-19 Remote Work Reality

By Jean-Yves Bisiaux, CTO and co-founder of EfficientIP In an attempt to slow down the spread of COVID-19, many companies are announcing precautionary measures – often including recommendations to work remotely....

More than Bounty: Beating Burnout with Hacker-Powered Security

By: Rena Chua, Bug Bounty Advisor at HackerOne A career in security is hardly dull or static. Nor would those attracted to the industry want it to be. On the contrary -- we often hear that security professionals are...

How to Cyber Security: Software is manufacturing

By: Jonathan Knudsen, Senior Security Strategist at Synopsys Software Integrity Group Traditional manufacturing is a useful analogy for creating software. I usually relate software to cars. If you want to build a...

Bring your own privacy: VPNs for consumers and orgs

Attributed to: Malwarebytes Labs   VPNs (virtual private networks) have been popular for quite some time now, and they’re worth a huge amount of money for the companies working in this area....