Introducing VideoBytes, by Malwarebytes Labs

This week, we’re launching VideoBytes, a new video series featuring research from Adam Kujawa, security evangelist and a director for Malwarebytes Labs.

Read more

Knowing when it’s worth the risk: riskware explained

Riskware is a type of software that, while considered legitimate, can still put users at risk in some way. Learn why anti-malware vendors detect it, and how to tell whether the apps you use are riskware or not.

Read more

Stop telephoning me-eh-eh-eh-eh: robocalls explained

The Federal Communications Commission (FCC) has identified robocalls as the number one complaint from the public. In this post, we tell you what you need to know to protect against the nasty ones.

Read more

Explained: the cloud

The cloud. What is it? What are the pros and cons, and how can we make it as safe as possible? This post covers the basics.

Read more

Out of character: Homograph attacks explained

Online and on traditional media, we hear and read about different kinds of cybersecurity attacks that sometimes we get overwhelmed with the terminologies. Most of us grasp what phishing attacks and denial of service (DoS) attacks are, but how familiar are we with homograph attacks?

Read more

Explained: YARA rules

YARA is a tool that can be used to identify files that meet certain conditions. It is mainly in use by security researchers to classify malware.

Read more

Explained: False positives

False positives are alarms for non-specific files or behavior that is flagged as malicious, while in fact there were no bad intentions present.

Read more

Explained: the Dark Web

How is the Dark Web different from the regular internet? We unravel a few misconceptions to bring you closer to the truth.

Read more

Explained: Environmental variables

This post is intended to make readers aware of the existence and use of environmental variables. A windows feature that is often only known to programmers and other advanced users.

Read more

Select your language