ALL POSTS Child identity theft, part 1: On familiar fraud Jovi Umawing March 3, 2020 0 Comments In 2013, 30-year-old Axton Betz-Hamilton received an angry phone call from her father two weeks after her mother, Pam, died.“What the… Lock and Code S1Ep1: On RSA, the human element, and the week in security Malwarebytes Labs March 2, 2020 0 Comments Last week, we told you we were launching a fortnightly podcast, called Lock and Code. This week, we made good on… Domen toolkit gets back to work with new malvertising campaign Threat Intelligence Team February 28, 2020 0 Comments Last year, we documented a new social engineering toolkit we called “Domen” being used in the wild. Threat actors were using… Stalkerware and online stalking are accepted by Americans. Why? David Ruiz February 27, 2020 0 Comments Despite warnings from domestic abuse networks, privacy rights advocates, and a committed faction of cybersecurity vendors, Americans may be accepting and… Mac adware is more sophisticated and dangerous than traditional Mac malware Thomas Reed February 27, 2020 0 Comments As the data revealed in our State of Malware report showed, Mac threats are on the rise, but they are not… Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server Jérôme Segura February 26, 2020 0 Comments Threat actors love to abuse legitimate brands and infrastructure—this, we know. Last year we exposed how web skimmers had found their… Introducing Lock and Code: a Malwarebytes Labs podcast Malwarebytes Labs February 25, 2020 0 Comments Intrepid Labs readers might be happy to know that we’re stepping into territory long-requested and desired: we’re launching a podcast. Malwarebytes… Biotech health care innovations meet security challenges Pieter Arntz February 25, 2020 0 Comments The level and speed of innovations taking place in the biotech industry are baffling. On the one hand, it makes us… A week in security (February 17 – 23) Malwarebytes Labs February 24, 2020 0 Comments Last week on Malwarebytes Labs, we highlighted the benefits and concerns of identity-as-a-service (IDaaS), an identity management scheme deployed from the… Previous 1 … 343 344 345 346 347 … 620 Next Contributors Threat Center Podcast Glossary Scams