ALL POSTS QxSearch hijacker fakes failed installs Pieter Arntz August 16, 2019 0 Comments Recently, one of the more dominant search hijacker families on our radar has started to display some curious behavior. The family… The Hidden Bee infection chain, part 1: the stegano pack hasherezade August 15, 2019 0 Comments About a year ago, we described the Hidden Bee miner delivered by the Underminer Exploit Kit. Hidden Bee has a complex… Trojans, ransomware dominate 2018–2019 education threat landscape Wendy Zamora August 14, 2019 0 Comments Heading into the new school year, we know educational institutions have a lot to worry about. Teacher assignments. Syllabus development. Gathering… Data and device security for domestic abuse survivors David Ruiz August 13, 2019 0 Comments For more than a month, Malwarebytes has worked with advocacy groups, law enforcement, and cybersecurity researchers to deliver helpful information in… Facial recognition technology: force for good or privacy threat? Christopher Boyd August 12, 2019 0 Comments All across the world, governments and corporations are looking to invest in or develop facial recognition technology. From law enforcement to… A week in security (August 5 – 11) Malwarebytes Labs August 12, 2019 0 Comments Last week on Malwarebytes Labs, we explained how brain-machine interface (BMI) technology could usher in a world of Internet of Thoughts,… Backdoors are a security vulnerability David Ruiz August 9, 2019 0 Comments Last month, US Attorney General William Barr resurrected a government appeal to technology companies: Provide law enforcement with an infallible, “secure”… Labs quarterly report finds ransomware’s gone rampant against businesses Wendy Zamora August 8, 2019 0 Comments Ransomware’s back—so much so that we created an entire report on it.For 10 quarters, we’ve covered cybercrime tactics and techniques, covering… 8 ways to improve security on smart home devices Kayla Matthews August 7, 2019 0 Comments Every so often, a news story breaks that hackers have made their way into a smart home device and stolen personal… Previous 1 … 353 354 355 356 357 … 614 Next Contributors Threat Center Podcast Glossary Scams