Time and time again, organizations learn the hard way that no matter which security solutions they have in place, if they…
Month: February 2019
Will pay-for-privacy be the new normal?
Privacy is a human right, and online privacy should be no exception. Yet, as the US considers new laws to protect…
What K–12 schools need to shore up cybersecurity
Crumbling infrastructure. Gaps in curriculum. Antiquated devices. Difficult COPPA laws. Lack of funding. Those are just a few of the obstacles…
New Golang brute forcer discovered amid rise in e-commerce attacks
E-commerce websites continue to be targeted by online criminals looking to steal personal and payment information directly from unaware shoppers. Recently,…
Max Schrems: lawyer, regulator, international man of privacy
Almost one decade ago, disparate efforts began in the European Union to change the way the world thinks about online privacy….
A week in security (February 18 – 24)
Last week on Malwarebytes Labs, we explored the world of crack hunting, gave you a 101 on the world of bots…
The lazy person’s guide to cybersecurity: minimum effort for maximum protection
Are you tired of that acquaintance who keeps bugging you with computer questions? Do you avoid visiting certain people because you…
How does macOS protect against malware?
Mac users often are told that “Macs don’t get viruses.” This is not really true, of course. Macs can and do…
Sophisticated phishing: a roundup of noteworthy campaigns
Phishing is a problem nearly as old as the Internet. Yet, criminals continue to reach into their bag of phishing tricks…
Good bots, bad bots: friend or foe?
One of the most talked about technologies online today is the ubiquitous bot. Simultaneously elusive yet also responsible for all of…