The recently departed Stephen Hawking is apparently back from the dead, now a target for scammers wanting to extract some quick…

Depending on the type and size of your organization, a DDoS (Distributed Denial of Service) attack can be anything from a…

At Malwarebytes, we frequently examine apps for detection as Potentially Unwanted Programs (PUPs). These are programs that exhibit a wide variety…

Hot on the heels of a grim blog about digital death comes…another blog about digital death. Except in this case, the…

Last week on Malwarebytes Labs, we took a look at the inner workings of a fileless attack, explored what happened in…

Hot on the heels of an open letter from investors urging Apple to do more to protect children from smartphone addiction, the…

The phone rings and it’s a number I don’t recognize. That’s enough to bring my mood down a few degrees. It…

Ever since the case of the San Bernadino shooter pitted Apple against the FBI over the unlocking of an iPhone, opinions…

This blog post was authored by @hasherezade, Jérôme Segura and Vasilios Hioureas. At the end of January, the South Korean Emergency…

This article was authored by David Sánchez, Mickaël Roger, and Jérôme Segura During the past few years, malicious spam campaigns have…