ALL POSTS A week in security (March 26 – April 01) Malwarebytes Labs April 2, 2018 0 Comments Last week, we looked at the thought process behind creating a ransomware decryptor, the inner workings of QuantLoader, the ways one… You down with P2P? 10 tips to secure your mobile payment app Jovi Umawing March 30, 2018 0 Comments If you look at the figures, you cannot deny that the eCommerce industry is steadily growing. More and more people are… TLS 1.3 is nearly here Christopher Boyd March 30, 2018 0 Comments TLS stands for “Transport Layer Security” and it’s rather important. Why’s that? Oh, I’m glad you asked. Here’s me, yelling my… The data breach epidemic: no info is safe Logan Strain March 29, 2018 0 Comments By now it’s obvious that data security technology and protocols haven’t kept pace with the needs of consumers. Even as more… Exploit kits: Winter 2018 review Jérôme Segura March 29, 2018 0 Comments In the past, we used to do a blog series on exploit kits where we would periodically check in on the… An in-depth malware analysis of QuantLoader Malwarebytes Labs March 28, 2018 0 Comments This guest post is written by Vishal Thakur, CSIRT/Salesforce. For more on Vishal, read his bio at the end of the… 10 ways to protect your Android phone Jovi Umawing March 28, 2018 0 Comments Android has been around for nearly a decade and has come a long way from its early wannabe iPhone days. New features,… Encryption 101: Decryptor’s thought process Vasilios Hioureas March 27, 2018 0 Comments In the previous parts 1, 2 and 3 of this series, we covered the basics of encryption, walked through a live… What Facebook’s Cambridge Analytica problem means for your data Christopher Boyd March 26, 2018 0 Comments As you may already know, there’s been a security meltdown at Facebook, thanks to a company called Cambridge Analytica and Donald… Previous 1 … 406 407 408 409 410 … 617 Next Contributors Threat Center Podcast Glossary Scams