All 101 Cybercrime Malwarebytes news PUP Security world Threat analysis

September 14, 2018 - Two factor authentication (2fa) was introduced to enhance login security, but does it always work as advertised? Or can it be bypassed?

CONTINUE READINGNo Comments

September 5, 2018 - Considering using spyware to surveil a cheating partner or keep an eye on the kiddos? Think again. Learn the telltale signs of spyware and why this suddenly mainstream malware needs to go back underground.

CONTINUE READINGNo Comments

August 14, 2018 - Term time is upon us once more, and soon the summer holidays will be a thing of the past. We offer up some handy hints and tips for better back to school cybersecurity, and link to numerous resources of our own to help parents and kids have a safer online experience this year.

CONTINUE READINGNo Comments

August 9, 2018 - The security vulnerabilities of the latest developments in tech have been well documented. But what about everyday technologies that have been around for a while or are widely adopted? Here are eight commonly-used tech conveniences that are not as ironclad as you might hope.

CONTINUE READINGNo Comments

July 20, 2018 - We take a look at the perils of the tools and services embedded into the websites you use on a daily basis, thanks to the development help of third parties.

CONTINUE READINGNo Comments

July 12, 2018 - Maybe it’s the quirky way some tech writers abbreviate it, or the surreal way it reminded you of that popular Michael Jackson song. Whatever triggers you to remember the term, for most of us, man-in-the-middle embodies something both familiar yet mysterious. Let’s get to know this threat a little bit better, shall we?

CONTINUE READINGNo Comments

June 25, 2018 - Automatic filters on our blog sometimes catch benign comments by accident. However, they also protect users from spammers, scammers, and malicious links. Read on to learn about our comment policy: what we block and why.

CONTINUE READINGNo Comments

May 23, 2018 - When it comes to poorly-written code, we're quick to point a finger at programmers, forgetting that they are beholden to the constraints of companies looking to push out tech product quickly. Thankfully, management can address bad coding habits with these seven ways to support, train, and motivate their staff.

CONTINUE READINGNo Comments

May 18, 2018 - Georgia Senate Bill 315 aimed to make all unauthorized access to computers illegal—sounds good, right? Read why provisions in its fine print made tech and security companies more than uncomfortable.

CONTINUE READINGNo Comments

May 10, 2018 - Parents don't just hand over the car keys to children who haven't taken driver's ed. Sadly, the same can't be said about smartphones. This book by Clayton Cranford shows parents the importance of keeping their kids safe online—and just how to do it.

CONTINUE READINGNo Comments

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language