ALL POSTS Advanced tools: Process Hacker Pieter Arntz November 9, 2018 0 Comments Process Hacker is a very valuable tool for advanced users. It can help them to troubleshoot problems or learn more about… How to create a sticky cybersecurity training program Jovi Umawing November 8, 2018 0 Comments Organizations know that training employees on cybersecurity and privacy are not only expensive but time-consuming. However, given that current threats are… Google logins: JavaScript now required Christopher Boyd November 7, 2018 0 Comments Google users: In news that may sound alarming, it is now a requirement for you to enable JavaScript.Why? When your username… Compromising vital infrastructure: transport and logistics Pieter Arntz November 6, 2018 0 Comments Back when I was a dispatcher for a courier and trucking company, we used to joke that it only took a… Browlock flies under the radar with complete obfuscation Jérôme Segura November 5, 2018 0 Comments Browlocks are the main driving force behind tech support scams, using a combination of malvertising and clever browser locker tricks to… A week in security (October 29 – November 4) Malwarebytes Labs November 5, 2018 0 Comments Last week on Malwarebytes Labs, we looked at a rogue cryptocurrency app installing backdoors, took a dive into the world of… Introducing Malwarebytes for Chromebook Malwarebytes Labs November 1, 2018 0 Comments Have you been thinking about switching over to Chromebook because you don’t need all the built-in software programs of a PC… Tomorrowland festival goers affected by data breach Christopher Boyd October 31, 2018 0 Comments Tomorrowland, a major international music festival, has revealed a data breach potentially affecting around 60,000 attendees.This one is a little different… How to tighten security and increase privacy on your browser Pieter Arntz October 31, 2018 0 Comments Is my browser making an effort to keep my system safe and my online behavior private? This is usually not the… Previous 1 … 383 384 385 386 387 … 617 Next Contributors Threat Center Podcast Glossary Scams