Over the last couple of months, we’ve heard a lot about a huge attack at Target stores where thousands of credit…

The continuous flow of high-profile data breaches are a problem for anyone wishing to stay secure. Every time I hear about…

In a recent article on the NSS Security blog, Stefan Frei discusses a potential standard for bug bounty programs and how it could…

Just recently, a fellow researcher here at Malwarebytes received an email asking us to stop blocking their website.The link navigates to…

You can hardly browse any website without encountering some type of advertisement along the way, typically in the shape of a…

Finding the balance between security and ease of use.A computer system, or almost anything else for that matter, can never be…

Don’t get me wrong, I love Chrome, I think it’s a fantastic browser and has a great track record of protecting…

This month marks the 10th Anniversary of National Cyber Security Awareness Month, or NCSAM, here in the United States and hopefully…

After supplying you with examples on how to encrypt your mail and how to encrypt files and folders I would like…

Wearable computing is a hot topic as of late.From smart watches like the rumored Samsung Galaxy Gear, to augmented reality, what was once…