byPaul DucklinCybercrime isn’t about just one sort of attack, one type of crook, or one method of protection!Learn more: Watch directly on YouTube if the video won’t play here.Click the on-screen Settings cog to speed up playback or show subtitles.Why not join us live next time?Don’t forget that these talks are streamed weekly on our Facebo
byPaul DucklinAre those little bits of personal information that you give away in the background of home photos and video calls really worth worrying about? We find out:Watch directly on YouTube if the video won’t play here.Click the on-screen Settings cog to speed up playback or show subtitles.Why not join us live next time?Don’t forget that the
byPaul DucklinIf you’re active on social media, you probably know that copyright infringement is a big deal online, and that even accidentally including or referring to somebody else’s material can leave you facing a copyright complaint notice sent by the social media platform involved.If you don’t sort out the complaint, you could end up l
byPaul DucklinWe discuss bug hunting – how to do it professionally, how NOT to do it, and how to react when bugs are reported to you:Watch directly on YouTube if the video won’t play here.Click the on-screen Settings cog to speed up playback or show subtitles.Related readingFor futher information, please take a look at the following:Have a domain
Metadata, which gives background information on pieces of data, is typically hidden. It becomes a problem when accidentally revealed. Often tied to photography mishaps, it can be timestamps. It might be location. In some cases, it can be log analysis. Many tutorials exist to strip this information out. This is because it can reveal more than intended when it
byPaul DucklinHere’s our latest Naked Security Live talk, explaining why HTTPS is vital, even if you’re publishing public data that isn’t confidential.Thats because HTTPS isn’t just about the confidentiality of the data you browse to – it’s also about improving your privacy in respect of what you chose to look at, when you
byPaul DucklinHere’s our latest Naked Security Live talk, discussing IM scams and how to avoid them, as well as giving you some pointers on how to think like a scammer and thereby stay one step ahead.Don’t forget that receiving a message from a friend’s account doesn’t always mean your friend actually sent the message – if their
byPaul DucklinDid you know you can join us for a live cybersecurity lecture every Friday?Just keep an eye on the @NakedSecurity Twitter feed or check our Facebook page on Fridays to find out the time we’ll be on air – it’s usually somewhere between 18:00 and 19:00 UK time, which is late morning/early afternoon on the West/East coast of Nort
If you only use your Mac for browsing the Web, sending and receiving email, and working in a word processor, it’s probably not all that important for it to display accurate colors. However, if you work with photos or videos, or even if you like to watch movies in the best possible conditions, color calibrating your display is essential.The calibration
If you believe reports in the news, impending deepfake disaster is headed our way in time for the 2020 United States election. Political intrigue, dubious clips, mischief and mayhem were all promised. We’ll need to be careful around clips of the President issuing statements about being at war, or politicians making defamatory statements. Everything is up for
byPaul DucklinWe do a show on Facebook every week in our Naked Security Live video series, where we discuss one of the big security concerns of the week.We’d love you to join in if you can – just keep an eye on the @NakedSecurity Twitter feed or check our Facebook page on Fridays to find out the time. (Note that you don’t need a Facebook ac
We have exciting news for avid readers of Malwarebytes Labs: This week, we’re launching a new, monthly video series that will feature the research, insights, and commentary of our own Adam Kujawa, security evangelist and a director for Malwarebytes Labs.
Welcome to VideoBytes, our little corner of threat cinema on the web.
The stories we’ll cover i
byPaul DucklinWe do a show on Facebook every week in our Naked Security Live video series, where we discuss one of the big security concerns of the week.We’d love you to join in if you can – just keep an eye on the @NakedSecurity Twitter feed or check our Facebook page on Fridays to find out the time.It’s usually about 18:00 UK time, which
byPaul DucklinWe do a show on Facebook every week in our Naked Security Live video series, where we discuss one of the big security concerns of the week.We’d love you to join in if you can – just keep an eye on the @NakedSecurity Twitter feed or check our Facebook page on Fridays to find out the time.It’s usually about 18:00 UK time, which
byPaul DucklinDid you know that we do a show on Facebook every week in our Naked Security Live video series?We usually discuss one of the big security concerns of the week – from data breaches and corporate hacks to vulnerabilities and scare stories – in a way that not only explains what happened but also offers useful tips about how to stay safe