dcsimg

EncroChat system eavesdropped on by law enforcement

Due to the level of sophistication of the attack, and the malware code, we can no longer guarantee the security of your device. This text caused a lot of aggravation, worries, and sleepless nights. No one wants to hear the security of their device has been compromised by a malware attack. The good news is that the actual victims of this malware attack were almost exclusively criminals. The bad … [Read more...]

How to Use OpenSSL to Generate Certificates

OpenSSL has been one of the most widely used certificate management and generation pieces of software for much of modern computing. … [Read more...]

Going dark: encryption and law enforcement

UPDATE, 05/22/2020: In the advent of the EARN IT Act, the debate on government subversion of encryption has reignited.  Given that the material conditions of the technology have not changed, and the arguments given in favor of the bill are not novel, we’ve decided to republish the following blog outlining our stance on the subject. Originally published July 25, 2017 We’re hearing it a lot … [Read more...]

What is MD5?

MD5 is still being used today as a hash function even though it has been exploited for years. In this article, we discuss what MD5 is; it's history, and how it is used today.  … [Read more...]

Introducing Malwarebytes Privacy

Here at Malwarebytes, we’re no strangers to using virtual private networks (VPNs) to protect our privacy while browsing online. Regular readers of our blog will remember that we’ve advised on VPN usage on many occasions, whether for mobile device users looking for anonymity or business owners wanting additional authentication protocols. We believe VPNs are an essential part of layered protection … [Read more...]

HTTPS and A Padlock Does Not Mean A Website is Secure

Online shoppers are often encouraged to ensure that their chosen online stores are 'secure', that the 's' in HTTPS is visible, and that the web browser displays a lock symbol. Propagating these visible indicators as confirmation of website security is not only irresponsible; it's also dangerous. … [Read more...]

Install Free Let’s Encrypt SSL Certificate for Single-Domain IIS Web Sites

In this article, you’re going to learn how to get free SSL certificates from the Let’s Encrypt CA. We’ll also touch on how to make sure that the website is being served strictly using HTTPS and confirm that the right SSL certificate is in use. … [Read more...]

AS2 vs. SFTP: Which is Best for You?

There are lots of file transfer protocols to choose from, but one that’s rarely discussed in depth is AS2. In this article, we take a deeper look at AS2, how it stacks up against SFTP, and why you would choose one or the other. … [Read more...]

Security Gateway a High Performer Again – G2 Crowd 2019 Fall Report

We’re proud to announce that Security Gateway for Email has once again been named a High Performer in Secure Email Gateways by G2 Crowd in their Fall Report. And if you are looking for a hosted solution, Security Gateway also was recognized as a top Cloud Email Security solution. Security Gateway for Email Servers – High Performer 2019 G2 Crowd awards are based on honest reviews from users. … [Read more...]

300 shades of gray: a look into free mobile VPN apps

The times, they are a changin’. When users once felt free to browse the Internet anonymously, post about their innermost lives on social media, and download apps with frivolity, folks are playing things a little closer to the vest these days. Nowadays, users are paying more attention to privacy and how their personal information is transmitted, processed, stored, and shared. Nearly every … [Read more...]