ALL POSTS 10 ways to protect your Android phone Jovi Umawing March 28, 2018 0 Comments Android has been around for nearly a decade and has come a long way from its early wannabe iPhone days. New features,… Encryption 101: Decryptor’s thought process Vasilios Hioureas March 27, 2018 0 Comments In the previous parts 1, 2 and 3 of this series, we covered the basics of encryption, walked through a live… What Facebook’s Cambridge Analytica problem means for your data Christopher Boyd March 26, 2018 0 Comments As you may already know, there’s been a security meltdown at Facebook, thanks to a company called Cambridge Analytica and Donald… Malicious cryptomining and the blacklist conundrum Jérôme Segura March 26, 2018 0 Comments When Coinhive first came out in September of 2017, it was fairly easy to identify websites using browser miners by looking… A week in security (March 19 – March 25) Malwarebytes Labs March 26, 2018 0 Comments Last week, we looked at the growing problem of smartphone addiction, how link rot is continually slicing down portions of the… “Celebrating Stephen Hawking” with a 419 scam Christopher Boyd March 23, 2018 0 Comments The recently departed Stephen Hawking is apparently back from the dead, now a target for scammers wanting to extract some quick… DDoS attacks are growing: What can businesses do? Pieter Arntz March 22, 2018 0 Comments Depending on the type and size of your organization, a DDoS (Distributed Denial of Service) attack can be anything from a… CyberByte steals Malwarebytes’ intellectual property Thomas Reed March 21, 2018 0 Comments At Malwarebytes, we frequently examine apps for detection as Potentially Unwanted Programs (PUPs). These are programs that exhibit a wide variety… The digital entropy of death: link rot Christopher Boyd March 20, 2018 0 Comments Hot on the heels of a grim blog about digital death comes…another blog about digital death. Except in this case, the… Previous 1 … 406 407 408 409 410 … 617 Next Contributors Threat Center Podcast Glossary Scams