The 25th anniversary of the webcam: What did it bring us?

This month the webcam has been around for 25 years. How has it developed and which are the concerns surrounding webcams and CCTVs?

Read more

Malwarebytes’ 2019 security predictions

Every year, we at Malwarebytes Labs like to stare into our crystal ball and foretell the future of malware. And while all hope is for a threat-free 2019, the reality likely includes botnets, IoT, artificial intelligence, and even more data breaches. When it comes to security, we can pretty much assure you that attacks will keep happening—just as the sun rises and sets. 

Read more

My precious: security, privacy, and smart jewelry

Fashionable and functional. These are the makings of smart jewelry. They aren’t secure, yet some are used to secure user data and online accounts. Should you still buy one?

Read more

A week in security (October 29 – November 4)

A roundup of security news from October 29 to November 4, including more problems with home hubs, phishing attack spikes, massively popular ransomware, and spies being charged for blueprint theft.

Read more

A week in security (October 1 – 7)

A roundup of the security news from October 1–7 including National Cybersecurity Awareness Month, LoJack, fileless malware, and BYOS.

Read more

Explained: What is big data?

In our explained series, we talk about the impact of big data on our society. What is it, who uses it, and for what purposes?

Read more

IoT domestic abuse: What can we do to stop it?

A disturbing new use of technology against loved ones has come to light: Internet of Things (IoT) domestic abuse cases are being reported, and security experts are wondering how best to tackle this new problem. What is it? And more importantly, what can we do to fight it?

Read more

A week in security (June 4 – June 10)

A roundup of the security news from June 4 – June 10, including IoT botnets, government attacks, dodgy Wi-Fi, and more.

Read more

Tips for safe summer travels: your cybersecurity checklist

A cybersecurity checklist for when you are about to travel or go on vacation, helps to prevent data-loss and other security issues.

Read more

Researchers discover vulnerabilities in smart assistants’ voice commands

Security researchers have now found new ways to exploit voice recognition weaknesses in your favorite home device: smart assistants. You may want to listen in.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language