HackDig : Dig high-quality web security articles

A week in security (August 17 – 23)

Last week on Malwarebytes Labs, we looked at the impact of COVID-19 on healthcare cybersecurity, dug into some pandemic stats in terms of how workforces coped with going remote, and served up a crash course on malware detection. Our most recent Lock and Code podcast explored the safety of parental monitoring apps. Other cybersecurity news Under lock an
Publish At:2020-08-24 13:03 | Read:1174 | Comments:0 | Tags:A week in security Malwarebytes news a week in security awis

The “Can You Hear Me” Scam Might Not Be as Serious as It First Appears

Scammers want nothing more than to steal our personal and/or financial information. Towards that end, they’ve come up numerous ways of tricking us into giving them our details. One particularly persistent method is the Grandma scam. Unlike email-based ploys, the Grandma scam centers around a fraudster who rings up an older individual. They pose as the
Publish At:2017-02-21 06:50 | Read:5370 | Comments:0 | Tags:Cyber Security Featured Articles phone scam

How To Prepare Yourself and Your Phone For Juhannus

In Finland, there is this thing called Juhannus. A few years ago, our former colleague Hetta described it like this: Well, Midsummer – or Juhannus – as it is called in Finnish, is one of the most important public holidays in our calendar. It is celebrated, as you probably guessed, close to the dates of the Summer Solstice, when day is at its longest in the n
Publish At:2016-06-23 04:15 | Read:9578 | Comments:0 | Tags:Mobile Phone Privacy Security Finland how to prepare for a l

Why are Android bugs so serious?

Yet another big vulnerability in the headlines. The Metaphor hack was discovered by Israel-based NorthBit and can be used to take control over almost any Android device. The vulnerability can be exploited from video files that people encounter when surfing the web. It affects all versions of Android except version 6, which is the latest major version also kn
Publish At:2016-03-18 23:31 | Read:5369 | Comments:0 | Tags:Internet of Things Mobile Online Threats Phone Security Andr

Kids need better protection – An open letter to developers and decision makers

Tuesday February 9th is Safer Internet Day this year. An excellent time to sit down and reflect about what kind of Internet we offer to our kids. And what kind of electronic environment they will inherit from us. I have to be blunt here. Our children love their smartphones and the net. They have access to a lot of stuff that interest them. And it’s their new
Publish At:2016-02-08 18:30 | Read:5144 | Comments:0 | Tags:Family Protection Mobile Online Threats Phone Privacy child

Want to Know how Adblocking Works?

Adblocking made waves last summer after Apple announced that it would bake content blocking capabilities into iOS 9. Content blocking lets users filter out content that they don’t want to load, and in this case, it worked with Apple’s Safari web browser. And there’s one kind of content that typically irritates people more than anything else – ads. So Apple’s
Publish At:2016-02-05 18:10 | Read:5237 | Comments:0 | Tags:Mobile Privacy F-Secure F-Secure Labs Internet mobile Phone

Top Five Mobile Devices That Run Linux

Article submitted by Mark In a market that is churning Android powered device after another Android powered device and the obligatory Apple update to its iPhone and iPad brands, it is no wonder people need to look elsewhere if they want to experience something different in the mobile segment. We aren’t really disrespecting Apple and Google’s effo
Publish At:2015-12-24 23:30 | Read:5828 | Comments:0 | Tags:Articles Guides phone smartphone tizen ubuntu

Is protection against self-incrimination dead in the digital era? (Poll)

How to balance between privacy and crime fighting? That’s one of the big questions now when we are entering the digitally connected era. Our western democracies have a set of well-established and widely accepted rules that control what authorities can and can’t do. One aspect of this has been in the headlines lately. That’s your right to “plead the Fifth”, a
Publish At:2015-09-30 13:55 | Read:8480 | Comments:0 | Tags:Mobile Passwords Phone Privacy authorities crime encryption

App permissions – your last best hope for privacy

We have written a lot about how companies treat you as an asset. A source of data that can be monetized in a variety of ways. Spotify did recently change their terms and ensured that this topic stays in the headlines. They want to collect information stored on your mobile device, such as contacts, photos and media files. No thanks! My Spotify app plays music
Publish At:2015-09-09 06:45 | Read:5617 | Comments:0 | Tags:Mobile Phone Privacy Android app app permissions apps big da

Only 10% protected – Interesting study on travelers’ security habits

Kaisu who is working for us is also studying tourism. Her paper on knowledge of and behavior related to information security amongst young travelers was released in May, and is very interesting reading. The world is getting smaller. We travel more and more, and now we can stay online even when travelling. Using IT-services in unknown environments does howeve
Publish At:2015-08-24 21:20 | Read:4730 | Comments:0 | Tags:Mobile Phone Security Social media cellphone communication I

Watch out for Costly Mobile Ads

There are lots of ways you can have a bad hair day with a mobile device – a rogue app from the Play Store, a dubious file from a non-official source or even a phish attack which takes advantage of a mobile’s smaller screen size. A less annoying issue is pop-ups, adverts and redirects – you’ll probably encounter these every so often on
Publish At:2015-08-11 16:05 | Read:20830 | Comments:0 | Tags:Online Security Mobile phone sms

Mobile Device Security Tips and Tricks

Desktops and laptops have long been major targets for viruses and other cyber attacks, but with the exponential growth and availability of mobile devices, new security threats are emerging. Though built-in kill switches (which have been mandated in some states, including California) help protect mobile devices from unauthorized use, and can even prevent crim
Publish At:2015-08-10 22:30 | Read:5060 | Comments:0 | Tags:Mobile Security Mobile phone security tips

Android’s Stagefright bug – phone vendors taken with their pants down

You have all heard the classic mantra of computer security: use common sense, patch your system and install antivirus. That is still excellent advice, but the world is changing. We used to repeat that mantra over and over to the end users. Now we are entering a new era where we have to stress the importance of updates to manufacturers. We did recently write
Publish At:2015-07-30 07:00 | Read:6391 | Comments:0 | Tags:Mobile Phone Security Android Google mobile patch security s

WhatsApp Scams: 3 Things you Need to Know

F-Secure Labs reported this week on a new WhatsApp scam that’s successfully spammed over 22,000 people. Spam seems to be as old as the Internet itself, and is both a proven nuisance AND a lucrative source of revenue for spammers. Most people don’t see what goes on behind the scenes, but spammers often employ very sophisticated schemes that can expose web sur
Publish At:2015-05-08 16:11 | Read:5266 | Comments:0 | Tags:Online Threats Security crime criminal digital F-Secure F-Se

Why Bring your own Device (BYOD)?

Do you ever use your personal phone to make work related calls? Or send work related e-mails? Maybe you even use it to work on Google Docs, or access company files remotely? Doing these things basically means you’re implementing a BYOD policy at your work, whether they know it or not. BYOD – that’s bring your own device – isn’t really a new trend, but it is
Publish At:2015-04-18 04:20 | Read:5015 | Comments:0 | Tags:Mobile Security BYOD communication F-Secure Phone VPN