Metadata, which gives background information on pieces of data, is typically hidden. It becomes a problem when accidentally revealed. Often tied to photography mishaps, it can be timestamps. It might be location. In some cases, it can be log analysis. Many tutorials exist to strip this information out. This is because it can reveal more than intended when it
byPaul DucklinHere’s our latest Naked Security Live talk, explaining why HTTPS is vital, even if you’re publishing public data that isn’t confidential.Thats because HTTPS isn’t just about the confidentiality of the data you browse to – it’s also about improving your privacy in respect of what you chose to look at, when you
byPaul DucklinHere’s our latest Naked Security Live talk, discussing IM scams and how to avoid them, as well as giving you some pointers on how to think like a scammer and thereby stay one step ahead.Don’t forget that receiving a message from a friend’s account doesn’t always mean your friend actually sent the message – if their
byPaul DucklinDid you know you can join us for a live cybersecurity lecture every Friday?Just keep an eye on the @NakedSecurity Twitter feed or check our Facebook page on Fridays to find out the time we’ll be on air – it’s usually somewhere between 18:00 and 19:00 UK time, which is late morning/early afternoon on the West/East coast of Nort
If you only use your Mac for browsing the Web, sending and receiving email, and working in a word processor, it’s probably not all that important for it to display accurate colors. However, if you work with photos or videos, or even if you like to watch movies in the best possible conditions, color calibrating your display is essential.The calibration
If you believe reports in the news, impending deepfake disaster is headed our way in time for the 2020 United States election. Political intrigue, dubious clips, mischief and mayhem were all promised. We’ll need to be careful around clips of the President issuing statements about being at war, or politicians making defamatory statements. Everything is up for
byPaul DucklinWe do a show on Facebook every week in our Naked Security Live video series, where we discuss one of the big security concerns of the week.We’d love you to join in if you can – just keep an eye on the @NakedSecurity Twitter feed or check our Facebook page on Fridays to find out the time. (Note that you don’t need a Facebook ac
We have exciting news for avid readers of Malwarebytes Labs: This week, we’re launching a new, monthly video series that will feature the research, insights, and commentary of our own Adam Kujawa, security evangelist and a director for Malwarebytes Labs.
Welcome to VideoBytes, our little corner of threat cinema on the web.
The stories we’ll cover i
byPaul DucklinWe do a show on Facebook every week in our Naked Security Live video series, where we discuss one of the big security concerns of the week.We’d love you to join in if you can – just keep an eye on the @NakedSecurity Twitter feed or check our Facebook page on Fridays to find out the time.It’s usually about 18:00 UK time, which
byPaul DucklinWe do a show on Facebook every week in our Naked Security Live video series, where we discuss one of the big security concerns of the week.We’d love you to join in if you can – just keep an eye on the @NakedSecurity Twitter feed or check our Facebook page on Fridays to find out the time.It’s usually about 18:00 UK time, which
byPaul DucklinDid you know that we do a show on Facebook every week in our Naked Security Live video series?We usually discuss one of the big security concerns of the week – from data breaches and corporate hacks to vulnerabilities and scare stories – in a way that not only explains what happened but also offers useful tips about how to stay safe
Shooting video with an iPhone is easy, but you may not know all the many options available on your device. You can choose the resolution and frame rate of your videos, shoot slow motion or time-lapse videos, and you can zoom and use the different lenses on your iPhone, if your model has multiple cameras. But you can also take stills while you’re shooti
byPaul DucklinThe infamous ransomware worm WannaCry is already more than two-and-a-half years old.WannaCry spreads using a security hole that was patched two months before the worm first appeared, so you’d be forgiven for assuming that it would have fizzled out by now and become little more than a museum curiosity.But a paper published recently by Soph
In Case You Missed It
Bromium recently engaged in a series of communications and events on the topic of Securing the Modern Endpoint, covering timely and provocative concepts including:
How detection consistently fails to secure the enterprise and why new thinking is desperately needed
How to realign your defenses around a modern threat risk model using few
Last February, we announced our relationship with HP, Inc.
HP Sure Click provides secure browsing on selected HP business laptops.
Sure Click delivers Bromium’s the first step in virtualization-based security for secure browsing.
HP, Inc. is committed to keep their customers safe from cyber crime. They have invested in creating a laptop strategy that