ALL POSTS Encryption 101: Decryptor’s thought process Vasilios Hioureas March 27, 2018 0 Comments In the previous parts 1, 2 and 3 of this series, we covered the basics of encryption, walked through a live… What Facebook’s Cambridge Analytica problem means for your data Christopher Boyd March 26, 2018 0 Comments As you may already know, there’s been a security meltdown at Facebook, thanks to a company called Cambridge Analytica and Donald… Malicious cryptomining and the blacklist conundrum Jérôme Segura March 26, 2018 0 Comments When Coinhive first came out in September of 2017, it was fairly easy to identify websites using browser miners by looking… A week in security (March 19 – March 25) Malwarebytes Labs March 26, 2018 0 Comments Last week, we looked at the growing problem of smartphone addiction, how link rot is continually slicing down portions of the… “Celebrating Stephen Hawking” with a 419 scam Christopher Boyd March 23, 2018 0 Comments The recently departed Stephen Hawking is apparently back from the dead, now a target for scammers wanting to extract some quick… DDoS attacks are growing: What can businesses do? Pieter Arntz March 22, 2018 0 Comments Depending on the type and size of your organization, a DDoS (Distributed Denial of Service) attack can be anything from a… CyberByte steals Malwarebytes’ intellectual property Thomas Reed March 21, 2018 0 Comments At Malwarebytes, we frequently examine apps for detection as Potentially Unwanted Programs (PUPs). These are programs that exhibit a wide variety… The digital entropy of death: link rot Christopher Boyd March 20, 2018 0 Comments Hot on the heels of a grim blog about digital death comes…another blog about digital death. Except in this case, the… Investors concerned about smartphone addiction; Apple responds with new webpage Jovi Umawing March 19, 2018 0 Comments Hot on the heels of an open letter from investors urging Apple to do more to protect children from smartphone addiction, the… Previous 1 … 403 404 405 406 407 … 614 Next Contributors Threat Center Podcast Glossary Scams