Black Friday 2020: How to shop safely online

With the promise of a mostly online Black Friday 2020, we offer up some tips for keeping yourself safe over the upcoming sales frenzy.

Read more

Lock and Code S1Ep19: Forecasting IoT cybersecurity with John Donovan and Adam Kujawa

This week on Lock and Code, get a backstage pass to a Malwarebytes employee cybersecurity training about the future of protecting the Internet of Things.

Read more

Explosive technology and 3D printers: a history of deadly devices

We look at how successful hardware hacks can damage devices—and potentially even put lives at risk.

Read more

Lock and Code S1Ep7: Sounding the trumpet on web browser privacy with Pieter Arntz

This week on Lock and Code, we talk to Pieter Arntz about web browser privacy—an often neglected subcategory of data privacy.

Read more

Technology and the power of moral panic

We look at how technology and a splash of moral panic have made for strange companions down the years.

Read more

Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack

We take a look at some of the most famous (or infamous) hacking scenes from TV and movies and the cybersecurity lessons, if any, we can learn from them.

Read more

Securing the MSP: why they’re their own worst enemy

Behind each cyberattack on the MSP is typically a system left unpatched, asset management undone, security officer not hired, or board who sees investment in security as a cost center rather than a long-term investment.

Read more

A week in security (November 4 – November 10)

A roundup of important security news from the week of November 4–10, including the release of Malwarebytes 4.0, vendor email compromise, fake news, robocalls, and more.

Read more

15,000 webcams vulnerable to attack: how to protect against webcam hacking

We take a look at the ever-present threat of webcam hacking, and what you can do to avoid being caught out.

Read more

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

When penetration testing for an organization, what OSINT tactics can researchers employ? We discuss how hacking with AWS buckets can provide more recon data and uncover any leaks.

Read more

Select your language