ALL POSTS Insurance data security laws skirt political turmoil David Ruiz September 25, 2019 0 Comments Across the United States, a unique approach to lawmaking has proved radically successful in making data security stronger for one industry—insurance… 15,000 webcams vulnerable to attack: how to protect against webcam hacking Christopher Boyd September 24, 2019 0 Comments Webcams may have been around for a long time, but that doesn’t mean we know what we’re doing with them. Webcam… A week in security (September 16 -22) Malwarebytes Labs September 23, 2019 0 Comments Last week on Labs, we sounded the alarm about the relaunch of Emotet, one of the year’s most dangerous forms of… What role does data destruction play in cybersecurity? Kayla Matthews September 20, 2019 0 Comments When organization leaders think about cybersecurity, it’s usually about which tools and practices they need to add to their stack—email protection,… CEOs offer their own view of a US data privacy law David Ruiz September 19, 2019 0 Comments Last week, the chief executives of more than 50 mid- and large-sized companies urged Congress to pass a national data privacy… Browser Guard combats privacy abuse, tracking, clickbait, and scammers Pieter Arntz September 19, 2019 0 Comments In July 2018, we introduced the Malwarebytes Browser Extension, a beta plugin for Firefox and Chrome aimed at delivering a safer,… International students in UK targeted by visa scammers Christopher Boyd September 18, 2019 0 Comments A new visa scam has come to light targeting international students from China studying in the UK. At least, it’s being… A week in security (September 9 – 15) Malwarebytes Labs September 16, 2019 0 Comments Last week on the Labs blog, we looked at free VPN offerings, how malware can hinder vital emergency services, and explored… Hacking with AWS: incorporating leaky buckets into your OSINT workflow Vasilios Hioureas September 13, 2019 0 Comments Penetration testing is often conducted by security researchers to help organizations identify holes in their security and fix them, before cybercriminals… Previous 1 … 353 354 355 356 357 … 618 Next Contributors Threat Center Podcast Glossary Scams