How to avoid potentially unwanted programs

Categories: Explained

Categories: News

Tags: potentially unwanted programs

Tags: PUAs

Tags: PUPs

If you’ve ever downloaded software onto your computer, chances are you’ve unknowingly cluttered your machine with potentially unwanted programs.

(Read more…)

The post How to avoid potentially unwanted programs appeared first on Malwarebytes Labs.

Read more

Explained: Fuzzing for security

Categories: Explained

Categories: News

Tags: Fuzzing

Tags: fuzz testing

Tags: memory leaks

Tags: runtime errors

Tags: race conditions

Tags: control flow error

Tags: memory allocation

Tags: buffer overflow

Fuzzing is an automated software testing method that uses a wide range of invalid and unexpected data as input to find flaws.

(Read more…)

The post Explained: Fuzzing for security appeared first on Malwarebytes Labs.

Read more

Explained: Steganography

Categories: Explained

Categories: News

Tags: Steganography

Tags: encryption

Tags: least significant bits

Tags: rgb

Tags: masking

Tags: palette-based

Tags: lossy

Tags: compression

Tags: cropping

Steganography is the prime example of hiding something in plain sight. We look at the basics, some methods, and the hurdles of hiding messages in images.

(Read more…)

The post Explained: Steganography appeared first on Malwarebytes Labs.

Read more

Blunting RDP brute-force attacks with rate limiting

Credit to Author: Mark Stockley| Date: Fri, 11 Mar 2022 22:33:07 +0000

Rate limiting can slow a determined password guessing attack to a crawl, giving defenders months of extra time to respond.

The post Blunting RDP brute-force attacks with rate limiting appeared first on Malwarebytes Labs.

Read more

Harnessing the power of identity management (IDaaS) in the cloud

Credit to Author: Malwarebytes Labs| Date: Tue, 18 Feb 2020 17:25:42 +0000

With security, compliance, and customer engagement driving organizations to the cloud, it’s no wonder IDaaS has become the standard in identity management. Learn about the benefits and concerns of IDaaS for organizations of all sizes.

Categories:

Tags:

(Read more…)

The post Harnessing the power of identity management (IDaaS) in the cloud appeared first on Malwarebytes Labs.

Read more

Explained: the strengths and weaknesses of the Zero Trust model

Credit to Author: Pieter Arntz| Date: Tue, 28 Jan 2020 16:00:00 +0000

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Categories:

Tags:

(Read more…)

The post Explained: the strengths and weaknesses of the Zero Trust model appeared first on Malwarebytes Labs.

Read more