All 101 Cybercrime Malwarebytes news PUP Security world Threat analysis

December 11, 2017 - Why do threat actors prefer mining for Monero rather than the very hot Bitcoin cryptocurrency? Let us point out the reasons.

CONTINUE READING4 Comments

December 6, 2017 - More and more applications are moving from desktop to the web, where they are particularly exposed to security risks. They are often tied to a database backend, and thus need to be properly secured, even though most of the time they are designed to restrict access to authenticated users only. PHP is used to develop...

CONTINUE READING1 Comment

December 5, 2017 - We've talked about how cryptocurrency uses blockchain technology. Now we take a closer look at its other applications, and why blockchain is on the brink of changing the world.

CONTINUE READINGNo Comments

November 16, 2017 - A trusted root certificate is the cornerstone of authentication and security in software and on the Internet. But even this can be abused by criminals. Learn when you shouldn't trust these trusted sources.

CONTINUE READING2 Comments

October 31, 2017 - As an alternative to reverse engineering malware that is protectively packed, we look at the option of analyzing malware by API calls to determine what a file might be up to.

CONTINUE READING1 Comment

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language