Lock and Code S1Ep20: Tracking the charities that track you online with Chris Boyd

This week on Lock and Code, we talk to Chris Boyd, lead malware intelligence analyst for Malwarebytes, about charity organizations and online ad tracking.

Read more

IoT forecast: Running antivirus on your smart device?

Cybersecurity for the Internet of Things (IoT) could look a lot like the cybersecurity overall in the future, including running antivirus on devices.

Read more

A week in security (November 9 – November 15)

In this week in security (November 9 – November 15), we look at RegretLocker, the future of IoT cybersecurity, and far more.

Read more

Lock and Code S1Ep19: Forecasting IoT cybersecurity with John Donovan and Adam Kujawa

This week on Lock and Code, get a backstage pass to a Malwarebytes employee cybersecurity training about the future of protecting the Internet of Things.

Read more

Chaos in a cup: When ransomware creeps into your smart coffee maker

This International Coffee Day, we looked at coffee machines that helped bring down a network of systems. Who would’ve guessed?

Read more

Explosive technology and 3D printers: a history of deadly devices

We look at how successful hardware hacks can damage devices—and potentially even put lives at risk.

Read more

Lock and Code S1Ep10: Pulling apart the Internet of Things with JP Taggart

This week on Lock and Code, we talk to JP Taggart, senior security researcher at Malwarebytes, about the Internet of Things.

Read more

End of line: supporting IoT in the home

Warranties which may not warranty, certificates which might fail to certify, lifespans which don’t match the length of cover promised. This could be IoT.

Read more

Cybersecurity labeling scheme introduced to help users choose safe IoT devices

Several countries are introducing a cybersecurity labeling scheme to inform consumers about the security features of IoT devices and force manufacturers to improve these features.

Read more

Explained: the strengths and weaknesses of the Zero Trust model

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Read more

Select your language