2024-04-29 |
Kaiser health insurance leaked patient data to advertisers |
News |
|
2024-04-29 |
A week in security (April 22 – April 28) |
News |
|
2024-04-25 |
Ring agrees to pay $5.6 million after cameras were used to spy on customers |
News |
|
2024-04-24 |
TikTok comes one step closer to a US ban |
News |
|
2024-04-24 |
Google ad for Facebook redirects to scam |
Scams |
|
2024-04-23 |
“Substantial proportion” of Americans may have had health and personal data stolen in Change Healthcare breach |
News |
|
2024-04-23 |
Picking fights and gaining rights, with Justin Brookman: Lock and Code S05E09 |
Podcast |
|
2024-04-22 |
Billions of scraped Discord messages up for sale |
News |
|
2024-04-22 |
A week in security (April 15 – April 21) |
News |
|
2024-04-19 |
Law enforcement reels in phishing-as-a-service whopper |
Cybercrime |
|
2024-04-18 |
Mental health company Cerebral failed to protect sensitive personal data, must pay $7 million |
News |
|
2024-04-18 |
Cannabis investment scam JuicyFields ends in 9 arrests |
News |
|
2024-04-18 |
Should you share your location with your partner? |
Privacy |
|
2024-04-16 |
Giant Tiger breach sees 2.8 million records leaked |
News |
|
2024-04-15 |
New ransomware group demands Change Healthcare ransom |
Ransomware |
|
2024-04-15 |
A week in security (April 8 – April 14) |
News |
|
2024-04-13 |
How to change your Social Security Number |
News |
|
2024-04-12 |
Apple warns people of mercenary attacks via threat notification system |
News |
|
2024-04-12 |
How to check if your data was exposed in the AT&T breach |
News |
|
2024-04-11 |
Microsoft’s April 2024 Patch Tuesday includes two actively exploited zero-day vulnerabilities |
Exploits and vulnerabilities |
|
2024-04-11 |
How to protect yourself from online harassment |
Cybercrime |
|
2024-04-10 |
Introducing the Digital Footprint Portal |
Cybercrime |
|
2024-04-10 |
New ransomware group demands Change Healthcare ransom |
Ransomware |
|
2024-04-10 |
Active Nitrogen campaign delivered via malicious ads for PuTTY, FileZilla |
Threat Intelligence |
|
2024-04-09 |
35-year long identity theft leads to imprisonment for victim |
News |
|
2024-04-08 |
Porn panic imperils privacy online, with Alec Muffett (re-air): Lock and Code S05E08 |
Podcast |
|
2024-04-08 |
A week in security (April 1 – April 7) |
News |
|
2024-04-08 |
60% of small businesses are concerned about cybersecurity threats |
Business |
|
2024-04-06 |
Cookie consent choices are just being ignored by some websites |
News |
|
2024-04-05 |
Bing ad for NordVPN leads to SecTopRAT |
Threat Intelligence |
|
2024-04-05 |
Jackson County hit by ransomware, declares state of emergency |
News |
|
2024-04-04 |
Google patches critical vulnerability for Androids with Qualcomm chips |
Android |
|
2024-04-04 |
Google Chrome gets ‘Device Bound Session Credentials’ to stop cookie theft |
News |
|
2024-04-03 |
AT&T confirms 73 million people affected by data breach |
News |
|
2024-04-02 |
Trusted Advisor now available for Mac, iOS, and Android |
News |
|
2024-04-02 |
2024 State of Malware in Education report: Top 6 cyberthreats facing K-12 and Higher Ed |
Awareness |
|
2024-04-02 |
Free VPN apps turn Android phones into criminal proxies |
Android |
|
2024-04-01 |
A week in security (March 25 – March 31) |
News |
|
2024-03-30 |
MFA bombing taken to the next level |
Apple |
|
2024-03-29 |
How to back up your Mac |
Apple |
|
2024-03-29 |
How to back up your Windows 10/11 PC to OneDrive |
Personal |
|
2024-03-29 |
How to back up your iPhone to a Windows computer |
Apple |
|
2024-03-29 |
How to back up your iPhone to a Mac |
Apple |
|
2024-03-29 |
How to back up your iPhone to iCloud |
Apple |
|
2024-03-29 |
Powering the future of ThreatDown with AI |
Business |
|
2024-03-29 |
Stopping a K-12 cyberattack (SolarMarker) with ThreatDown MDR |
Business |
|
2024-03-28 |
Facebook spied on Snapchat users to get analytics about the competition |
News |
|
2024-03-28 |
Update Chrome now! Google patches possible drive-by vulnerability |
Exploits and vulnerabilities |
|
2024-03-27 |
Disturbing robocaller fined $9.9 million |
News |
|
2024-03-27 |
Meta to abandon social media tracking tool CrowdTangle |
News |
|
2024-03-26 |
Patch now: Mozilla patches two critical vulnerabilities in Firefox |
Exploits and vulnerabilities |
|
2024-03-26 |
YouTube ordered to reveal the identities of video viewers |
News |
|
2024-03-26 |
Vans warns customers of data breach |
News |
|
2024-03-26 |
Securing your home network is long, tiresome, and entirely worth it, with Carey Parker: Lock and Code S05E07 |
Podcast |
|
2024-03-25 |
3 important lessons from a devastating ransomware attack |
Ransomware |
|
2024-03-25 |
A week in security (March 18 – March 24) |
News |
|
2020-03-26 |
Consumerization: a better way to answer cybersecurity challenges |
Opinion ‧ Akshay Bhargava |
|
2020-03-25 |
Criminals hack Tupperware website with credit card skimmer |
Hacking ‧ Jérôme Segura |
|
2020-03-25 |
Windows 7 is EOL: What next? |
Awareness ‧ Pieter Arntz |
|
2020-03-24 |
Fake “Corona Antivirus” distributes BlackNET remote administration tool |
Threat analysis ‧ Threat Intelligence Team |
|
2020-03-24 |
A week in security (March 16 – 22) |
A week in security ‧ Malwarebytes Labs |
|
2020-03-20 |
Coronavirus scams, found and explained |
Scams ‧ David Ruiz |
|
2020-03-19 |
Security tips for working from home (WFH) |
How-tos ‧ Pieter Arntz |
|
2020-03-19 |
Cybercriminals impersonate World Health Organization to distribute fake coronavirus e-book |
Social engineering ‧ Threat Intelligence Team |
|
2020-03-18 |
Child identity theft, part 2: How to reclaim your child’s identity |
Awareness ‧ Jovi Umawing |
|
2020-03-17 |
Lock and Code S1Ep2: On the challenges of managed service providers |
Podcast ‧ Malwarebytes Labs |
|
2020-03-16 |
APT36 jumps on the coronavirus bandwagon, delivers Crimson RAT |
Threat analysis ‧ Threat Intelligence Team |
|
2020-03-14 |
The effects of climate change on cybersecurity |
Awareness ‧ Pieter Arntz |
|
2020-03-13 |
Coronavirus impacts security conferences and events: check your schedule |
Security world ‧ Christopher Boyd |
|
2020-03-13 |
RemoteSec: achieving on-prem security levels with cloud-based remote teams |
Business ‧ Dan Macharia |
|
2020-03-12 |
Securing the MSP: best practices for vetting cybersecurity vendors |
Business ‧ William Tsing |
|
2020-03-11 |
Rocket Loader skimmer impersonates CloudFlare library in clever scheme |
Threat analysis ‧ Jérôme Segura |
|
2020-03-10 |
A week in security (March 2 – 8) |
A week in security ‧ Malwarebytes Labs |
|
2020-03-09 |
International Women’s Day: awareness of stalkerware, monitoring, and spyware apps on the rise |
Stalkerware ‧ David Ruiz |
|
2020-03-07 |
Bring your own privacy: VPNs for consumers and orgs |
Privacy ‧ Malwarebytes Labs |
|
2020-03-06 |
Technology and the power of moral panic |
Awareness ‧ Christopher Boyd |
|
2020-03-05 |
Are our police forces equipped to deal with modern cybercrimes? |
Opinion ‧ Pieter Arntz |
|
2020-03-04 |
Child identity theft, part 1: On familiar fraud |
Awareness ‧ Jovi Umawing |
|
2020-03-03 |
Lock and Code S1Ep1: On RSA, the human element, and the week in security |
Podcast ‧ Malwarebytes Labs |
|
2020-02-29 |
Domen toolkit gets back to work with new malvertising campaign |
Threat analysis ‧ Threat Intelligence Team |
|
2020-02-28 |
Mac adware is more sophisticated and dangerous than traditional Mac malware |
Mac ‧ Thomas Reed |
|
2020-02-28 |
Stalkerware and online stalking are accepted by Americans. Why? |
Stalkerware ‧ David Ruiz |
|
2020-02-28 |
Stalkerware and online stalking are accepted by Americans. Why? |
Malwarebytes news ‧ David Ruiz |
|
2020-02-27 |
Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server |
Threat analysis ‧ Jérôme Segura |
|
2020-02-26 |
Biotech health care innovations meet security challenges |
Vital infrastructure ‧ Pieter Arntz |
|
2020-02-26 |
Introducing Lock and Code: a Malwarebytes Labs podcast |
Podcast ‧ Malwarebytes Labs |
|
2020-02-25 |
A week in security (February 17 – 23) |
A week in security ‧ Malwarebytes Labs |
|
2020-02-25 |
Why managed service providers (MSP) are critical for business continuity |
Opinion ‧ Jovi Umawing |
|
2020-02-21 |
Threat spotlight: RobbinHood ransomware takes the driver’s seat |
Threat spotlight ‧ Pieter Arntz |
|
2020-02-20 |
Rudy Giuliani’s Twitter mishaps invite typosquatters and scammers |
Scams ‧ Jérôme Segura |
|
2020-02-19 |
Harnessing the power of identity management (IDaaS) in the cloud |
Explained ‧ Malwarebytes Labs |
|
2020-02-19 |
A week in security (February 10 – 16) |
A week in security ‧ Malwarebytes Labs |
|
2020-02-15 |
Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack |
Awareness ‧ Sam Chester |
|
2020-02-14 |
Cyber tips for safe online dating: How to avoid privacy gaffs, exploits, and scams |
Privacy ‧ Malwarebytes Labs |
|
2020-02-13 |
Android Trojan xHelper uses persistent re-infection tactics: here’s how to remove |
Android ‧ Nathan Collier |
|
2020-02-11 |
Malwarebytes Labs releases 2020 State of Malware Report |
Reports ‧ Malwarebytes Labs |
|
2020-02-11 |
Battling online coronavirus scams with facts |
aries25 |
|
2020-02-11 |
A week in security (February 3 – 9) |
A week in security ‧ Malwarebytes Labs |
|
2020-02-08 |
Google Maps: online interventions with offline ramifications |
Privacy ‧ Malwarebytes Labs |
|
2020-02-07 |
Adposhel adware takes over browser push notifications administration |
Adware ‧ Pieter Arntz |
|