Malware

Malware news, analysis, research, how-to, opinion, and video.

pc antivirus
north korea statue pyongyang

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

security risks in the IoT [internet of things] network

The 5 best malware metrics you can generate

Are you asking the right computer security questions? If you can answer these five, you'll know better how to secure your organization.

north korea statue pyongyang

North Korean anti-virus uses old Trend Micro components

Researchers at Checkpoint have published a report showing that North Korea's SiliVaccine, the country's anti-virus product, uses functional elements taken from a ten-year-old copy of Trend Micro's anti-virus.

Will LaSala

Salted Hash Ep 24: Defending against mobile threats

Welcome back! After shooting several episodes during the RSA Conference in San Francisco, this week Salted Hash talks mobile threats with VASCO's Will LaSala. In addition to this week's episode, we've also got some additional footage...

security risk - phishing / malware / social engineering

What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders

With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.

virtual transactions - digital money - cryptocurrency - blockchain

Cryptomining, not ransomware, the top malware threat so far this year

Cryptominer-based attacks increased, while ransomware-based attacks decreased in Q1 2018, according to Comodo Cybersecurity Threat Research Labs.

2 linux malware scarier

GoScanSSH malware targets Linux systems but avoids government servers

A new strain of malware aimed at Linux-based SSH servers is actively trying to avoid infecting government or military systems.

computer keyboard delete trash

SamSam group deletes Atlanta's contact portal after the address goes public

An image shared with local media during the early stages of a SamSam ransomware infection in Atlanta exposed the contact portal assigned to the city by the group responsible for the attack. When questioned about their actions via the...

ransomware at your service 4

SamSam ransomware attacks have earned nearly $850,000

First emerging in late 2015, the group believed to be responsible for the SamSam ransomware family has targeted small and large businesses, healthcare, governments, and education. To date, the group has made nearly $850,000 USD

location symantec headquarters exterior 300dpi

Symantec: Diverse threats remain a consistent problem online

A report published this evening by Symantec outlines the rocky year consumers and business owners had online in 2017, covering everything from coin mining attacks, problems in the supply chain, ransomware, BEC attacks, and more.

lmt booth mwc 2018

Latvian mobile operator invites cyber attackers to have a go

Security researchers wanting to test the kind of malware that could break public networks now have a place to do so in safety.

bunch of toy robots

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet

Mirai took advantage of insecure IoT devices in a simple but clever way. It scanned big blocks of the internet for open Telnet ports, then attempted to log in default passwords. In this way, it was able to amass a botnet army.

pirate flag pirates piracy

Flight simulator add-on used malware to steal pirates' passwords

Gamers are not happy that Flight Sim Labs added malware to the A320-X flight simulator add-on -- meant to be used with Microsoft Flight Simulator X and Prepar3D 3.0 -- in an effort to stop software pirates.

abstract FinTech image of a dollar sign referencing digital transactions and potentially blockchain

Hackers exploit Jenkins servers, make $3 million by mining Monero

Hackers exploiting Jenkins servers made $3 million in one of the biggest malicious cryptocurrency mining operations ever.

north korea statue pyongyang

North Korea hacking group is expanding operations, researchers say

A group of hackers from North Korea (DPRK), recently connected to the usage of an Adobe Flash zero-day vulnerability (CVE-2018-4878), has expanded its operations in both scope and sophistication, FireEye says.

cat hiding box hide and seek

How to protect your network from PowerShell exploits

PowerShell is a powerful and versatile tool for both Windows sysadmins and hackers, who use it to build malicious scripts that avoid detection. This advice will make it harder for them to do so.

nup 177120 0001

Security lessons from the 2018 Pyeongchang Winter Olympics

Shiny buttons that go "ping!" considered harmful.

steal theft hacker crime laptop firewall

Who Is watching the watchers?

The Kaseya event should serve as a wake-up call for companies that fail to scrutinize the security standards of their vendors—including their security vendors!

Load More