ALL POSTS Relax. Internet password books are OK Christopher Boyd April 1, 2021 0 Comments Passwords are a hot topic on social media at the moment, due to the re-emergence of a discussion about good password… Android “System Update” malware steals photos, videos, GPS location David Ruiz April 1, 2021 0 Comments A newly discovered piece of Android malware shares the same capabilities found within many modern stalkerware-type apps—it can swipe images and… The npm netmask vulnerability explained so you can actually understand it Pieter Arntz March 31, 2021 0 Comments The popular npm netmask library recently encountered a serious problem, explained as follows:The npm netmask package incorrectly evaluates individual ipv4 octets… PYSA, the ransomware attacking schools Jovi Umawing March 30, 2021 0 Comments The education sector’s cybersecurity problem has compounded in the last few months. A recent warning from the FBI, in mid-March, put… Malicious commits found in PHP code repository: What you need to know Malwarebytes Labs March 30, 2021 0 Comments You’ve probably heard that PHP’s Git repository was recently compromised, allowing backdoors to be added to the code located there. You… Why you need to trust your VPN: Lock and Code S02E05 Malwarebytes Labs March 29, 2021 0 Comments This week on Lock and Code, we discuss the top security headlines generated right here on Labs. In addition, we speak… The one reason your iPhone needs a VPN Malwarebytes Labs March 29, 2021 0 Comments For years, Apple has marketed its iPhone as the more secure, more private option when compared to other smart phones, which… Steam users: Don’t fall for the “I accidentally reported you” scam Jovi Umawing March 29, 2021 0 Comments Suppose that, out of the blue, a Steam user tells you they’ve accidentally reported you for something you didn’t do, like… 5G slicing vulnerability could be used in DoS attacks Pieter Arntz March 29, 2021 0 Comments The IT security researchers at AdaptiveMobile have called out what looks like an important vulnerability in the architecture of 5G network… Previous 1 … 306 307 308 309 310 … 619 Next Contributors Threat Center Podcast Glossary Scams