ALL POSTS A week in security (March 2 – 8) Malwarebytes Labs March 9, 2020 0 Comments Last week on Malwarebytes Labs, we fired up part 1 of our series on child identity theft, asked how well law… Bring your own privacy: VPNs for consumers and orgs Malwarebytes Labs March 6, 2020 0 Comments VPNs (virtual private networks) have been popular for quite some time now, and they’re worth a huge amount of money for… Technology and the power of moral panic Christopher Boyd March 5, 2020 0 Comments Moral panic is a fascinating topic, and often finds itself tied up in the cutting edge-technology of the times once it works… Are our police forces equipped to deal with modern cybercrimes? Pieter Arntz March 4, 2020 0 Comments “You should have asked for the presence of a digital detective,” Karen said when I told her what happened at the… Child identity theft, part 1: On familiar fraud Jovi Umawing March 3, 2020 0 Comments In 2013, 30-year-old Axton Betz-Hamilton received an angry phone call from her father two weeks after her mother, Pam, died.“What the… Lock and Code S1Ep1: On RSA, the human element, and the week in security Malwarebytes Labs March 2, 2020 0 Comments Last week, we told you we were launching a fortnightly podcast, called Lock and Code. This week, we made good on… Domen toolkit gets back to work with new malvertising campaign Threat Intelligence Team February 28, 2020 0 Comments Last year, we documented a new social engineering toolkit we called “Domen” being used in the wild. Threat actors were using… Stalkerware and online stalking are accepted by Americans. Why? David Ruiz February 27, 2020 0 Comments Despite warnings from domestic abuse networks, privacy rights advocates, and a committed faction of cybersecurity vendors, Americans may be accepting and… Mac adware is more sophisticated and dangerous than traditional Mac malware Thomas Reed February 27, 2020 0 Comments As the data revealed in our State of Malware report showed, Mac threats are on the rise, but they are not… Previous 1 … 340 341 342 343 344 … 618 Next Contributors Threat Center Podcast Glossary Scams