dcsimg

Bring your own security (BYOS): good idea or not?

We’ve talked about the concept of Bring Your Own Device, or BYOD, on the blog before. BYOD is a popular policy whereby employees can bring personally-owned devices, such as laptops, tablets, or smartphones, to work and use them to access data and applications. It helps to cut costs and can increase productivity, but it brings with it many security concerns and implications. Similar in theory … [Read more...]

Safari users: Where did your extensions go?

Safari 12 has brought with it some changes to how OSX handles browser extensions. At WWDC in June, Apple announced that Safari would block legacy extensions installed from outside the Extensions Gallery, which itself would now be deprecated. As a replacement, Safari will now rely on “app extensions.” Apple said that app extensions don’t see any browsing details, are more … [Read more...]

Assessing the security of a portable router: a look inside its hardware

Network administrators should perform security assessments of hardware that they will provide their users, or particularly paranoid users might want to poke at their devices just to be extra sure. In this blog post, we will demonstrate the techniques used to assess security on a generic portable router purchased online. We have redacted its identifiable information as our goal here isn’t to … [Read more...]

Explained: regular expression (regex)

Regular expression, or “regex” for short, is a mathematical term for the theory used to describe regular languages. But in computing, regexes are used to search for patterns in files and databases, and their functionality is incorporated into many modern programming languages. Regex search patterns make wildcards look like clumsy clowns because they offer a whole slew of additional … [Read more...]

How to secure your content management system

Suppose you want to start your own blog or set up a website where you can easily manage its content, the way it looks, and how often it changes. What you need is a content management system (CMS). WordPress, Drupal, and Joomla are some of the most popular content management systems used by both professionals and amateurs. The three I mentioned are open-source CMSes, meaning they are software with … [Read more...]

Explained: What is big data?

If the pile of manure is big enough, you will find a gold coin in it eventually. This saying is used often to explain why anyone would use big data. Needless to say, in this day and age, the piles of data are so big, you might end up finding a pirate’s treasure. How big is the pile? But when is the pile big enough to consider it big data? Per Wikipedia: “Big data is data sets that are so big and … [Read more...]

What’s the real value—and danger—of smart assistants?

You’ve heard them called virtual assistants, digital personal assistants, voice assistants, or smart assistants. Operated by artificial intelligence, technologies such as Siri, Alexa, Google Assistant, and Cortana have become ubiquitous in our culture. But what exactly do they do? And how seriously should we take them? While all the tech giants want us to use their smart assistants all the … [Read more...]

Block all or nothing to prevent ICO fraud?

At Malwarebytes, we feel we have reached a point where we need to ask our customers how to proceed on the subject of ICO scams. Asking for your opinion may seem strange to some of you, but Malwarebytes comes from a community of mutual help and trust. If you were unaware of this, reading how our CEO got involved in the anti-malware business is a good way to get acquainted with the cornerstones this … [Read more...]

How Augmented Reality Can Benefit Your Company

[This article originally appeared in our Community Blog.] The entering of Augmented Reality into our workplaces is inevitable. But what is AR and how can industries tap into its vast potential? Today, most people know the term augmented reality and almost as many could give a more or less accurate description of what it is. But did you know that the technology has been developed since the 1960’s … [Read more...]

5 Worries You May Have About Remote Access Implementation

Implementing remote access software will elevate your business in many aspects. Your employees will have more freedom to help your customers, which results in happiness all around. Ultimately, this greater happiness leads to increased productivity and a higher ROI. If you’re thinking about roadblocks you may hit along the way, don’t fret. We’ve provided ways to get around some worries you may face … [Read more...]