Very interesting article worth sharing on knowing the facts and scams online
BLOG.MALWAREBYTES.COM
Battling online coronavirus scams with facts
Bluetooth security alarm. Make sure you turn off Bluetooth when not in use. Most importantly, update your Bluetooth device with the manufacturer patch to fix the flaw which allows local hackers to scan and attack your electronic device.
https://www.bitdefender.com/box/blog/iot-news/millions-bluetooth-devices-affected-sweyntooth-vulnerabilities/?cid=soc%7Cbox%7Cfb%7Cnoncomm
BITDEFENDER.COM
Millions of Bluetooth Devices Affected by SWEYNTOOTH Vulnerabilities - Bitdefender BOX Blog
worth reading, https://blog.malwarebytes.com/social-engineering/2020/01/spear-phishing-101-what-you-need-to-know/?utm_source=double-opt-in&utm_medium=email-internal-b2c&utm_campaign=EM-B2C-2020-February-newsletter-Issue1&utm_content=Spear-phishing-101
Spear phishing 101: what you need to know
We look at the threat of spear phishing, why it's such a problem, and what organizations can do to lessen the chance of a successful attack.
Spear phishing 101: what you need to know
We look at the threat of spear phishing, why it's such a problem, and what organizations can do to lessen the chance of a successful attack.
Spear phishing 101: what you need to know
We look at the threat of spear phishing, why it's such a problem, and what organizations can do to lessen the chance of a successful attack.
See more at
blog.malwarebytes.com
Excellent info! a must read https://blog.malwarebytes.com/how-tos-2/2020/01/dubious-downloads-how-to-check-if-a-website-and-its-files-are-malicious/
Dubious downloads: How to check if a website and its files are malicious
Users often search the web for downloads when companies no longer support software, and what they find is dubious. How can they tell if the files are safe? We tell how to spot the difference.
Dubious downloads: How to check if a website and its files are malicious
Users often search the web for downloads when companies no longer support software, and what they find is dubious. How can they tell if the files are safe? We tell how to spot the difference.
See more at
blog.malwarebytes.com
For the travelers this holiday season, https://blog.malwarebytes.com/explained/2019/11/explained-juice-jacking/?utm_source=double-opt-in&utm_medium=email-internal-b2c&utm_campaign=EM-B2C-2019-December-newsletter-Issue1&utm_content=juice-jacking
Explained: juice jacking
Juice jacking is a type of cyberattack that uses a USB charging port to steal data or infect phones with malware. Learn how it works and ways to protect against it.
Explained: juice jacking
Juice jacking is a type of cyberattack that uses a USB charging port to steal data or infect phones with malware. Learn how it works and ways to protect against it.
See more at
blog.malwarebytes.com
$50 off any used laptop or desktop. Sale ends Saturday, December 7th.