ALL POSTS A week in security (January 13 – 19) Malwarebytes Labs January 20, 2020 0 Comments Last week on Malwarebytes Labs, we taught you how to prevent a rootkit attack, explained what data enrichment means, informed you… Business in the front, party in the back: backdoors in elastic servers expose private data Vasilios Hioureas January 17, 2020 0 Comments It seems like every day we read another article about a data breach or leak of cloud storage exposing millions of… Explained: data enrichment Pieter Arntz January 16, 2020 0 Comments How do your favorite brands know to use your first name in the subject line of their emails? Why do you… Rules on deepfakes take hold in the US David Ruiz January 15, 2020 0 Comments For years, an annual, must-pass federal spending bill has served as a vehicle for minor or contentious provisions that might otherwise… A week in security (January 6 – 12) Malwarebytes Labs January 13, 2020 0 Comments Last week on Malwarebytes Labs, we told readers how to check the safety of websites and their related files, explored the… Threat spotlight: Phobos ransomware lives up to its name Jovi Umawing January 10, 2020 0 Comments Ransomware has struck dead on organizations since it became a mainstream tool in cybercriminals’ belts years ago. From massive WannaCry outbreaks… United States government-funded phones come pre-installed with unremovable malware Nathan Collier January 9, 2020 0 Comments UPDATE: July 31, 2020Months after publishing this first investigation into government-funded mobile phones, we were contacted by a concerned user about… 6 ways hackers are targeting retail businesses Kayla Matthews January 8, 2020 0 Comments Retail hacking is no new phenomenon, although it has increased in frequency over the last few years. In fact, retailers experienced… Dubious downloads: How to check if a website and its files are malicious Pieter Arntz January 7, 2020 0 Comments A significant amount of malware infections and potentially unwanted program (PUP) irritants are the result of downloads from unreliable sources. There… Previous 1 … 344 345 346 347 348 … 618 Next Contributors Threat Center Podcast Glossary Scams