Info & Blog
Categories
Premium
Site License
GDPR
Badgelife: A Defcon 26 retrospective
Posted: August 22, 2018 by Jean Taggart One more year gone, one more Defcon completed. Defcon is the longest-running security conference in existence and one that I have been attending since Defcon 18. It is an opportunity to see and interact in real life with...
The enemy is us: a look at insider threats
Posted: August 20, 2018 by Jovi Umawing They can go undetected for years. They do their questionable deeds in the background. And, at times, one wonders if they’re doing more harm than good. Although this sounds like we’re describing some sophisticated PUP you haven’t...
Under the hoodie: why money, power, and ego drive hackers to cybercrime
Posted: August 15, 2018 by Wendy Zamora Last updated: August 16, 2018 Just one more hour behind the hot grill flipping burgers, and Derek* could call it a day. Under his musty hat, his hair was matted down with sweat, and his work uniform was spattered with grease. He...
White hat, black hat, and the emergence of the gray hat: the true costs of cybercrime
Posted: August 8, 2018 by Malwarebytes Labs Last updated: August 6, 2018 This post was written by Michael Osterman of Osterman Research. Osterman Research recently completed a major survey on behalf of Malwarebytes to determine the actual cost of cybercrime to...
8 everyday technologies that can make you vulnerable to cyberattacks
Posted: August 9, 2018 by Kayla Matthews Last updated: August 8, 2018 The technological advances of the modern world make for an exciting and convenient lifestyle. With each new development, from artificial intelligence to the Internet of Things, we make the mundane...
Introducing: Malwarebytes Browser Extension
Posted: July 26, 2018 by Malwarebytes Labs Are you tired of all the unwanted content the world wide web offers up, whether you like it or not? It is our privilege to introduce you to the Malwarebytes Browser Extension (BETA). Or, better said, the Malwarebytes Browser...
What’s in the spam mailbox this week?
Posted: July 31, 2018 by Christopher Boyd Last updated: July 30, 2018 We’ve seen a fair few spam emails in circulation this week, ranging from phishing to money muling to sexploitation. Shall we take a look? The FBI wants to give you back your money First out of the...
Can we trust our online project management tools?
Posted: July 6, 2018 by Pieter Arntz Last updated: July 4, 2018 How would you feel about sharing confidential information about your company on Twitter or Facebook? That doesn’t sound right, does it? So, in a corporate life where we keep our work calendars online, and...
Internet Safety Month: How to manage your child’s online presence
Posted: June 28, 2018 by Jovi Umawing When you hear the term “reputation risk management,” you might think of a buzzword used in the business sector. Reputation risk management is a term used to describe how companies identify potential risks that may harm their...