Anyone who doesn’t use, or at least hasn’t heard of, voice assistants belongs to a very exclusive club. For many, it’s easier to ask Google, Alexa, or Siri a question rather than typing in a search query. However, as with any futuristic technology, care is called for when it comes to voice helpers. We’ve already posted…

Modern smartphones have successfully combined the functionality of a phone, camera, music player, public transit pass, and even a wallet for many years now. Naturally, this makes you wonder about the security of the data they store. Let’s figure out how well smartphones protect users’ most valuable information and how their main security mechanism — a…

— Mac users saw more malware in Q2 (April to June) than they saw in all of 2016 — Malwarebytes now provides real-time cyber protection for Mac users SANTA CLARA, Calif. – August 24, 2017 – Malwarebytes, the leader in advanced malware prevention and remediation solutions, today announced the release of Malwarebytes for Mac, featuring real-time protection…

— Malwarebytes now provides superior mobile protection for Android users to protect against growing levels of mobile malware — Android ransomware increased more than 100 percent between Q1 and Q2 2017 SANTA CLARA, Calif. – August 24, 2017 – Malwarebytes™, the leader in advanced malware prevention and remediation solutions, today announced the release of Malwarebytes for Android,…

What are the key elements of a good security program? Why did you answer that way? Seems a lot of security is ‘handed-down’ knowledge. We pride data and evidence-driven decisions while suggesting security is too hard to measure and pin down. Curious, no?

Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. A SQL injection is a SQL injection, no matter who’s trying it.  But what about the outliers? What about threats that impact you, but you can’t remediate, or establish a policy to cover? Here are 5 cyberthreats that if you’re not frightened by,…

Bayesian spam filtering is based on Bayes rule, a statistical theorem that gives you the probability of an event. In Bayesian filtering it is used to give you the probability that a certain email is spam. Named after the statistician Rev. Thomas Bayes who provided an equation that basically allows new information to update the…

Security executives desperate to fill cybersecurity openings face the worst IT skills shortage in memory with the workforce gap in the information security field expected to reach 1.5 million cybersecurity job openings by 2019. The White House grew so concerned that it introduced the Cybersecurity National Action Plan earlier this year. The government’s investment to…