A brief history of video game saves and data modification

We look at a history of saving game data in video games, and how it usually provides modders and hackers with the best chance of tampering with game data.

Categories:

Tags:

(Read more…)

The post A brief history of video game saves and data modification appeared first on Malwarebytes Labs.

Lock and Code S1Ep7: Sounding the trumpet on web browser privacy with Pieter Arntz

This week on Lock and Code, we talk to Pieter Arntz about web browser privacy—an often neglected subcategory of data privacy.

Categories:

Tags:

(Read more…)

The post Lock and Code S1Ep7: Sounding the trumpet on web browser privacy with Pieter Arntz appeared first on Malwarebytes Labs.

Technology and the power of moral panic

We look at how technology and a splash of moral panic have made for strange companions down the years.

Categories:

Tags:

(Read more…)

The post Technology and the power of moral panic appeared first on Malwarebytes Labs.

Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack

We take a look at some of the most famous (or infamous) hacking scenes from TV and movies and the cybersecurity lessons, if any, we can learn from them.

Categories:

Tags:

(Read more…)

The post Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack appeared first on Malwarebytes Labs.

Securing the MSP: their own worst enemy

Behind each cyberattack on the MSP is typically a system left unpatched, asset management undone, security officer not hired, or board who sees investment in security as a cost center rather than a long-term investment.

Categories:

Tags:

(Read more…)

The post Securing the MSP: their own worst enemy appeared first on Malwarebytes Labs.

A week in security (November 4 – November 10)

A roundup of important security news from the week of November 4–10, including the release of Malwarebytes 4.0, vendor email compromise, fake news, robocalls, and more.

Categories:

Tags:

(Read more…)

The post A week in security (November 4 – November 10) appeared first on Malwarebytes Labs.

15,000 webcams vulnerable to attack: how to protect against webcam hacking

We take a look at the ever-present threat of webcam hacking, and what you can do to avoid being caught out.

Categories:

Tags:

(Read more…)

The post 15,000 webcams vulnerable to attack: how to protect against webcam hacking appeared first on Malwarebytes Labs.

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

When penetration testing for an organization, what OSINT tactics can researchers employ? We discuss how hacking with AWS buckets can provide more recon data and uncover any leaks.

Categories:

Tags:

(Read more…)

The post Hacking with AWS: incorporating leaky buckets into your OSINT workflow appeared first on Malwarebytes Labs.

Cellular networks under fire from Soft Cell attacks

We break down the recently revealed attacks on telco operators around the globe, targeting specific high-value individuals.

Categories:

Tags:

(Read more…)

The post Cellular networks under fire from Soft Cell attacks appeared first on Malwarebytes Labs.