ALL POSTS Max Schrems: lawyer, regulator, international man of privacy David Ruiz February 25, 2019 0 Comments Almost one decade ago, disparate efforts began in the European Union to change the way the world thinks about online privacy.One… A week in security (February 18 – 24) Malwarebytes Labs February 25, 2019 0 Comments Last week on Malwarebytes Labs, we explored the world of crack hunting, gave you a 101 on the world of bots… The Advanced Persistent Threat Files: APT1 William Tsing February 22, 2019 0 Comments We’ve heard a lot about Advanced Persistent Threats (APTs) over the past few years. As a refresher, APTs are prolonged, aimed… The lazy person’s guide to cybersecurity: minimum effort for maximum protection Pieter Arntz February 21, 2019 0 Comments Are you tired of that acquaintance who keeps bugging you with computer questions? Do you avoid visiting certain people because you… How does macOS protect against malware? Thomas Reed February 21, 2019 0 Comments Mac users often are told that “Macs don’t get viruses.” This is not really true, of course. Macs can and do… Sophisticated phishing: a roundup of noteworthy campaigns Jovi Umawing February 20, 2019 0 Comments Phishing is a problem nearly as old as the Internet. Yet, criminals continue to reach into their bag of phishing tricks… Good bots, bad bots: friend or foe? Christopher Boyd February 20, 2019 0 Comments One of the most talked about technologies online today is the ubiquitous bot. Simultaneously elusive yet also responsible for all of… Crack hunting: not all it’s cracked up to be Tammy Stewart February 18, 2019 0 Comments People sometimes ask us in the forums if a keygen or software crack is safe to use. Sometimes, these programs do… A week in security (February 11 – 17) Malwarebytes Labs February 18, 2019 0 Comments Last week on Malwarebytes Labs we discussed the return of the Sextortion Bitcoin scams, we gave you an early overview of… Previous 1 … 373 374 375 376 377 … 617 Next Contributors Threat Center Podcast Glossary Scams