We take a look at a study which dives into the connection between popular UK based charity organisations and tracking, Real Time Bidding, and data analysis
We take a deep dive into the IcedID Trojan, describing the new payloads of this advanced malware.
Threat actors combine phishing with a web skimmer to create a devious scheme designed to lift credit card data from unaware shoppers.
When it comes to cybersecurity, journalists need to protect themselves, their sources, and the freedom of the press. Which methods should they use?
Last week, the FTC announced its settlement with Google over YouTube’s COPPA violations, including requirements for better protecting children’s data. But is it enough?
TrickBot’s latest feature allows it to tamper with the web sessions of users from Verizon, T-Mobile, and Sprint mobile carriers.
We look at recent research exploring the threat of clickjacking, along with other solutions considered by site owners and analysts for protecting users against these online attacks.
Amidst never-ending headlines about data breaches, data misuse, and opaque data-sharing agreements from major companies, users have few legal options to actually protect their privacy in court. Instead, they rely on technology.
In the first blog for Malwarebytes Labs’ cybersecurity and data privacy law series, we tackle US data privacy compliance from a startup’s perspective. GDPR, COPPA, HIPAA—it’s all here.