ALL POSTS DEF CON 27 retrospective: badge life redux Jean Taggart August 20, 2019 0 Comments Kickstarter or DEF CON attendee? Be forewarned, this light overview contains some mild spoilers. If you want the purest “Da Bomb”… How much personalization is too much? The Parallax August 19, 2019 0 Comments This story originally ran in The Parallax on January 25, 2019, and was written by Dan Tynan.In 2012, when Target used… A week in security (August 12 – 18) Malwarebytes Labs August 19, 2019 0 Comments Last week on Malwarebytes Labs, we took a look at the potential pitfalls of facial recognition technology, looked at ways domestic… QxSearch hijacker fakes failed installs Pieter Arntz August 16, 2019 0 Comments Recently, one of the more dominant search hijacker families on our radar has started to display some curious behavior. The family… The Hidden Bee infection chain, part 1: the stegano pack hasherezade August 15, 2019 0 Comments About a year ago, we described the Hidden Bee miner delivered by the Underminer Exploit Kit. Hidden Bee has a complex… Trojans, ransomware dominate 2018–2019 education threat landscape Wendy Zamora August 14, 2019 0 Comments Heading into the new school year, we know educational institutions have a lot to worry about. Teacher assignments. Syllabus development. Gathering… Data and device security for domestic abuse survivors David Ruiz August 13, 2019 0 Comments For more than a month, Malwarebytes has worked with advocacy groups, law enforcement, and cybersecurity researchers to deliver helpful information in… Facial recognition technology: force for good or privacy threat? Christopher Boyd August 12, 2019 0 Comments All across the world, governments and corporations are looking to invest in or develop facial recognition technology. From law enforcement to… A week in security (August 5 – 11) Malwarebytes Labs August 12, 2019 0 Comments Last week on Malwarebytes Labs, we explained how brain-machine interface (BMI) technology could usher in a world of Internet of Thoughts,… Previous 1 … 356 357 358 359 360 … 618 Next Contributors Threat Center Podcast Glossary Scams