Coming up on the tenth anniversary of Satoshi Nakamoto’s paper, do we really need yet another take on Bitcoin? Well, I think so. Today, I am going to focus on an aspect of this technology that needs more discussion — privacy. The bedrock of blockchain — that every transaction is added into the history and…

Anyone who doesn’t use, or at least hasn’t heard of, voice assistants belongs to a very exclusive club. For many, it’s easier to ask Google, Alexa, or Siri a question rather than typing in a search query. However, as with any futuristic technology, care is called for when it comes to voice helpers. We’ve already posted…

Modern smartphones have successfully combined the functionality of a phone, camera, music player, public transit pass, and even a wallet for many years now. Naturally, this makes you wonder about the security of the data they store. Let’s figure out how well smartphones protect users’ most valuable information and how their main security mechanism — a…

— Mac users saw more malware in Q2 (April to June) than they saw in all of 2016 — Malwarebytes now provides real-time cyber protection for Mac users SANTA CLARA, Calif. – August 24, 2017 – Malwarebytes, the leader in advanced malware prevention and remediation solutions, today announced the release of Malwarebytes for Mac, featuring real-time protection…

— Malwarebytes now provides superior mobile protection for Android users to protect against growing levels of mobile malware — Android ransomware increased more than 100 percent between Q1 and Q2 2017 SANTA CLARA, Calif. – August 24, 2017 – Malwarebytes™, the leader in advanced malware prevention and remediation solutions, today announced the release of Malwarebytes for Android,…

What are the key elements of a good security program? Why did you answer that way? Seems a lot of security is ‘handed-down’ knowledge. We pride data and evidence-driven decisions while suggesting security is too hard to measure and pin down. Curious, no?

Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. A SQL injection is a SQL injection, no matter who’s trying it.  But what about the outliers? What about threats that impact you, but you can’t remediate, or establish a policy to cover? Here are 5 cyberthreats that if you’re not frightened by,…

Bayesian spam filtering is based on Bayes rule, a statistical theorem that gives you the probability of an event. In Bayesian filtering it is used to give you the probability that a certain email is spam. Named after the statistician Rev. Thomas Bayes who provided an equation that basically allows new information to update the…