Last week on Malwarebytes Labs, we looked at spyware going mainstream, how the popular game Fortnite sparks security concerns for Android users, and how…

Network administrators should perform security assessments of hardware that they will provide their users, or particularly paranoid users might want to…

There is a concerning trend lately in the Mac App Store. Several security researchers have independently found different apps that are…

There’s been no small outbreak of chaos in mobile land recently, all because of an astonishingly popular game called Fortnite.Here’s the…

Stealware.Surveillanceware.Stalkerware.These are terms alternately used to effectively identify a file-based threat that has been around since 1996: spyware. More than two…

Last week, we looked at dubious antics in mobile land, a peculiar case of spam on the official Cardi B website,…

Regular expression, or “regex” for short, is a mathematical term for the theory used to describe regular languages. But in computing, regexes…

Malware can be made of many components. Often, we encounter macros and scripts that work as malicious downloaders. Some functionalities can…

Traditionally, malware attacks as we have always known them are files written to disk in one form or another that require…