ALL POSTS The new landscape of pre-installed mobile malware: malicious code within Nathan Collier January 2, 2019 0 Comments Here’s a scary thought: Mobile devices may soon come with pre-installed malware on required system apps. While it might sound like… 2018: The year of the data breach tsunami Logan Strain December 28, 2018 0 Comments It’s tough to remember all of the data breaches that happened in 2018. But when you look at the largest and… Using the blockchain to create secure backups Pieter Arntz December 27, 2018 0 Comments “Oh no! I’ve got a ransomware notice on my workstation. How did this happen?”“Let’s figure that out later. First, apply the… Assessing the security of a portable router: a look inside its hardware, part deux Jean Taggart December 26, 2018 0 Comments In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to… A week in security (December 17 – 23) Malwarebytes Labs December 24, 2018 0 Comments Last week on Labs we looked at Fuchsia OS as a possible alternative for Android, explained all the reasons why cybercriminals… Underminer exploit kit improves in its latest iteration Jérôme Segura December 21, 2018 0 Comments One of the most interesting exploit kits we track is also a bit of an elusive one, and as such does… Smart speakers: Christmas treat or lump of coal? Christopher Boyd December 21, 2018 0 Comments Christmas is nearly upon us, and thoughts are perhaps turning to various digital presents of a “smart” nature. Home security, hubs,… This online quiz is now confirmed to be a phishing scam Jovi Umawing December 20, 2018 0 Comments Ah, online quizzes. Many of us know that they can be somewhat dodgy and nonsense, really—but that doesn’t stop us from… Christmas tech scams roundup Christopher Boyd December 20, 2018 0 Comments There’s a fair few Christmas tech scams floating around out there as 2018 winds up, and we thought it’d be a… Previous 1 … 379 380 381 382 383 … 618 Next Contributors Threat Center Podcast Glossary Scams