The bevy of mobile device sensors in modern smartphones and tablets make them more akin to pocket-sized laboratories and media studios…

UPDATE 9/27, 11:00am: Updated for the misconception that the bootrom was actually being modified. Apparently, the “permanent” only refers to the…

The times, they are a changin’. When users once felt free to browse the Internet anonymously, post about their innermost lives…

A post by Ian Beer of Google Project Zero released late yesterday evening sent the security community reeling. According to Beer,…

Those who are familiar with Bluetooth BR/EDR technology (aka Bluetooth Classic, from 1.0 to 5.1) can attest that it is not…

For more than a month, Malwarebytes has worked with advocacy groups, law enforcement, and cybersecurity researchers to deliver helpful information in…

In late June, Malwarebytes revived its long-running campaign against a vicious type of malware in use today. This malware peers into…

When people think of hacking, most imagine desktop computers, laptops, or perhaps even security cameras. However, in recent years, cybercriminals have…

In a report published in 2011, IBM revealed that mobile users are three times more likely to fall for phishing scams compared…

iPhones have a reputation for being notoriously secure. After all, they caused quite the kerfuffle between Apple and the FBI because…