ALL POSTS How much personalization is too much? The Parallax August 19, 2019 0 Comments This story originally ran in The Parallax on January 25, 2019, and was written by Dan Tynan.In 2012, when Target used… A week in security (August 12 – 18) Malwarebytes Labs August 19, 2019 0 Comments Last week on Malwarebytes Labs, we took a look at the potential pitfalls of facial recognition technology, looked at ways domestic… QxSearch hijacker fakes failed installs Pieter Arntz August 16, 2019 0 Comments Recently, one of the more dominant search hijacker families on our radar has started to display some curious behavior. The family… The Hidden Bee infection chain, part 1: the stegano pack hasherezade August 15, 2019 0 Comments About a year ago, we described the Hidden Bee miner delivered by the Underminer Exploit Kit. Hidden Bee has a complex… Trojans, ransomware dominate 2018–2019 education threat landscape Wendy Zamora August 14, 2019 0 Comments Heading into the new school year, we know educational institutions have a lot to worry about. Teacher assignments. Syllabus development. Gathering… Data and device security for domestic abuse survivors David Ruiz August 13, 2019 0 Comments For more than a month, Malwarebytes has worked with advocacy groups, law enforcement, and cybersecurity researchers to deliver helpful information in… Facial recognition technology: force for good or privacy threat? Christopher Boyd August 12, 2019 0 Comments All across the world, governments and corporations are looking to invest in or develop facial recognition technology. From law enforcement to… A week in security (August 5 – 11) Malwarebytes Labs August 12, 2019 0 Comments Last week on Malwarebytes Labs, we explained how brain-machine interface (BMI) technology could usher in a world of Internet of Thoughts,… Backdoors are a security vulnerability David Ruiz August 9, 2019 0 Comments Last month, US Attorney General William Barr resurrected a government appeal to technology companies: Provide law enforcement with an infallible, “secure”… Previous 1 … 352 353 354 355 356 … 614 Next Contributors Threat Center Podcast Glossary Scams