All 101 Cybercrime Malwarebytes news PUP Security world Threat analysis

September 12, 2018 - There's a new kind of fraud out there, and it's after organizations that have embraced omnichannel, a strategy that focuses on improved user experience. We take a look at what omnichannel is, the kinds of fraud that can affect businesses using this approach, and how they can protect themselves—and their clients.

CONTINUE READINGNo Comments

September 11, 2018 - We take a look at some of the safe ways to waste a spammer's time, whether by email or telephone.

CONTINUE READINGNo Comments

September 10, 2018 - A roundup of the security news from September 3 – 9, including spyware going mainstream, Mac App Store apps stealing and abusing customer data, and Fortnite install concerns.

CONTINUE READINGNo Comments

September 10, 2018 - In this post, we acquire the necessary equipment to analyze the security of an inexpensive portable router, which we access through its diagnostic interface, and poke around inside.

CONTINUE READINGNo Comments

September 7, 2018 - There are several apps in the Mac App Store that are collecting data about users that they should not be collecting. Here's what you need to know.

CONTINUE READINGNo Comments

September 6, 2018 - We take a look at what's going with gaming juggernaut Fortnite's decision to snub the Google Play store, why allowing installs from unknown sources on Android is a bad idea, and what the future might bring if such a setup ever catches on.

CONTINUE READINGNo Comments

September 5, 2018 - Considering using spyware to surveil a cheating partner or keep an eye on the kiddos? Think again. Learn the telltale signs of spyware and why this suddenly mainstream malware needs to go back underground.

CONTINUE READINGNo Comments

September 3, 2018 - A round-up of the security news from August 27 – September 2, including ransomware, interesting talks during BlackHat, botnets, and the evils of JavaScript.

CONTINUE READINGNo Comments

August 31, 2018 - What is regular expression (regex) and what makes it vulnerable to attack? Learn how to use regex safely and avoid ReDoS attacks in the process.

CONTINUE READINGNo Comments

August 30, 2018 - When we recently analyzed payloads related to Hidden Bee (dropped by the Underminer EK), we noticed something unusual. After reversing the malware, we discovered that its authors actually created their own executable format. Follow our step-by-step analysis for a closer look.

CONTINUE READINGNo Comments

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language