Ransomware’s back—so much so that we created an entire report on it. For 10 quarters, we’ve covered cybercrime tactics and techniques,…
Month: August 2019
8 ways to improve security on smart home devices
Every so often, a news story breaks that hackers have made their way into a smart home device and stolen personal…
How brain-machine interface (BMI) technology could create an Internet of Thoughts
She plugged the extension for car transportation in the brain-machine interface connectors at the right side of her head, and off…
A week in security (July 29 – August 4)
Last week on Malwarebytes Labs we discussed the security and privacy changes in Android Q, how to get your Equifax money…
Say hello to Lord Exploit Kit
Just as we had wrapped up our summer review of exploit kits, a new player entered the scene. Lord EK, as…
Everything you need to know about ATM attacks and fraud: part 2
This is the second and final installment of our two-part series on automated teller machine (ATM) attacks and fraud. In part…
Capital One breach exposes over 100 million credit card applications
Just as we were wrapping up the aftermath of the Equifax breach—how was that already two years ago?—we are confronted with…
Making the case: How to get the board to invest in government cybersecurity
Security leaders are no longer simply expected to design and implement a security strategy for their organization. As a key member…
No summer break for Magecart as web skimming intensifies
This summer, you are more likely to find the cybercriminal groups Magecart client-side rather than poolside. Web skimming, which consists of…