Apple shines and buffs Mac security—Is it enough to stop today’s malware?

Apple is ramping up its security efforts, but its go-it-alone approach risks shutting allies out and protecting attackers.

Read more

The strangest cybersecurity events of 2020: a look back

In a year of unbridled strangeness, these are the strangest cybersecurity events that made us collectively say: “Wait… seriously?”

Read more

Apple security hampers detection of unwanted programs

Recent moves by Apple signal a potentially difficult future on macOS, where antivirus developers will have to play by increasingly limiting rules.

Read more

HP printer issue on Mac: What happened?

Last week, many Mac users received a ‘malware’ warning on their screens when trying to access their HP printer. Here’s what happened.

Read more

Apple’s notarization process fails to protect

Apple introduced the concept of notarization to ensure any new software submitted to the App Store is malware-free. But is it all for show?

Read more

Mac ThiefQuest malware may not be ransomware after all

We discovered a new Mac malware, ThiefQuest, that appeared to be ransomware at first glance. However, once we dug in deeper, we found out its true identity—and intention.

Read more

Windows 7 is EOL: What next?

Windows 7 is EOL, meaning it’s reached the end of its lifecycle. It’s time to move on to a more secure OS—but that doesn’t mean you no longer need security software.

Read more

Mac adware is more sophisticated and dangerous than traditional Mac malware

Adware and PUPs can actually be far more invasive and dangerous on the Mac than “real” malware. We demonstrate with analysis of Crossrider, a sophisticated Mac adware that uses evasion and persistence techniques more complex than nation-state malware.

Read more

Malwarebytes Labs releases 2020 State of Malware Report

The 2020 State of Malware Report reveals how cybercriminals upped the ante on businesses, Mac threats outpaced PCs, and ransomware continued its targeted, deadly assault with new families in 2019. Learn all this and more in the full report, linked in our blog.

Read more

Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks

Researchers called it KNOB, a clever attack against the firmware of a Bluetooth chip that can allow hackers to successfully hijack paired devices and steal their sensitive data. Are users at risk?

Read more

Select your language