ALL POSTS How 5G could impact cybersecurity strategy Kayla Matthews May 9, 2019 0 Comments With the recent news that South Korea has rolled out the world’s first 5G network, it’s clear that we’re on the… Vulnerabilities in financial mobile apps put consumers and businesses at risk Jovi Umawing May 8, 2019 0 Comments Security hubris. It’s the phrase we use to refer to our feeling of confidence grounded on assumptions we all have (but… The top six data privacy takeaways for users David Ruiz May 8, 2019 0 Comments In April, Malwarebytes Labs completed its data privacy and cybersecurity law blog series, a two-month long exploration spanning five continents, 50… What to do when you discover a data breach Pieter Arntz May 7, 2019 0 Comments Your cell phone goes off in the middle of your well-deserved sleep and you try to find it before your partner… A week in security (April 29 – May 5) Malwarebytes Labs May 6, 2019 0 Comments Last week on Labs we discussed the possible exit scam of dark net market Wall Street Market, how the Electrum DDoS… The top six takeaways for corporate data privacy compliance David Ruiz May 3, 2019 0 Comments For nearly two months, Malwarebytes Labs led readers on a journey through data privacy laws around the world, exploring the nuances… Cryptojacking in the post-Coinhive era Jérôme Segura May 2, 2019 0 Comments September 2017 is widely recognized as the month in which the phenomenon that became cryptojacking began. The idea that website owners… Mysterious database exposed personal information of 80 million US households Christopher Boyd May 1, 2019 0 Comments Word has broken of yet another massive data trove exposed for anyone to see. A research team from vpnMentor discovered an… Mozilla urges Apple to make privacy a team sport David Ruiz May 1, 2019 0 Comments We often say cybersecurity is a team sport, but, pending a public advocacy campaign from one major tech developer to another,… Previous 1 … 362 363 364 365 366 … 614 Next Contributors Threat Center Podcast Glossary Scams