ALL POSTS Physician, protect thyself: An ounce of prevention is worth a pound of cure Jovi Umawing April 6, 2018 0 Comments In part one of our Physician, protect thyself series, we recognized significant security problems within the healthcare industry that need addressing. Health… Maybe you shouldn’t use LinkedIn William Tsing April 5, 2018 0 Comments UPDATE: 4/6/2018LinkedIn reached out for comment on the article, and we’d like to clarify our position based on their concerns. They wrote:Members… LockCrypt ransomware: weakness in code can lead to recovery Malwarebytes Labs April 4, 2018 0 Comments At the start of the year, it seemed that 2018 was going to be all about cryptominers. They so overwhelmingly dominated… Panerabread.com breach could have impacted millions Wendy Zamora April 3, 2018 0 Comments Customers who signed up for a Panerabread.com account in order to order fast-casual baked goods may want to guard their dough…. Malicious gaming extensions: a child’s play to infection Pieter Arntz April 3, 2018 0 Comments Did you ever lend your laptop to a child to play a video game, only to get it back filled with… Mobile Menace Monday: Fake WhatsApp can steal info from your phone Nathan Collier April 2, 2018 0 Comments Last month, a blogger at My Online Security reported receiving a spam comment containing WhatsApp Plus. Going through the process, they… A week in security (March 26 – April 01) Malwarebytes Labs April 2, 2018 0 Comments Last week, we looked at the thought process behind creating a ransomware decryptor, the inner workings of QuantLoader, the ways one… You down with P2P? 10 tips to secure your mobile payment app Jovi Umawing March 30, 2018 0 Comments If you look at the figures, you cannot deny that the eCommerce industry is steadily growing. More and more people are… TLS 1.3 is nearly here Christopher Boyd March 30, 2018 0 Comments TLS stands for “Transport Layer Security” and it’s rather important. Why’s that? Oh, I’m glad you asked. Here’s me, yelling my… Previous 1 … 405 406 407 408 409 … 617 Next Contributors Threat Center Podcast Glossary Scams