Healthcare and ransomware are in the news in a big way. Data leaks are inevitable, but those are typically associated with…
Year: 2021
As cybersecurity products evolve to better protect against new forms of malware, trickier evasion techniques, and more organized cybercrime campaigns, the…
You may decide to delete your Twitter account, because social media isn’t for everyone. Perhaps you set up an account to…
Encryption is a term used to describe the methods that hide the true meaning of messages using code, especially to prevent…
If you’re worried about the risk of insider threats, you’re not alone. It can affect anyone, even the FBI. A federal…
Incognito mode is the name of Google Chrome’s private browsing mode, but it’s also become the catch-all term used to describe…
Last week on Malwarebytes Labs, we looked at a banking trojan full of nasty tricks, explained some tips and pointers for…
This week on Lock and Code, we speak to cybersecurity advocate and author Carey Parker about “dark patterns,” which are subtle…
Months ago, we told readers about the importance of using a VPN on their iPhones, and while those lessons do apply…
“It’s cracking, the whole thing.” The words were delivered quickly, but in a thoughtful and measured way. As if the person…