Malware

Malware | News, how-tos, features, reviews, and videos

binary code, magnifying lens, skull and crossbones
vulnerable cryptojacking hacking breach security

The 18 biggest data breaches of the 21st century

Security practitioners weigh in on the 18 worst data breaches in recent memory.

ransomware

What is ransomware? How these attacks work and how to recover from them

Ransomware is a form of malicious software (or malware) that, once it's taken over your computer, threatens you with harm, usually by denying you access to your data. The attacker demands a ransom from the victim, promising — not...

Twitter

Twitter bug may have been exploited by state-sponsored hackers

A flaw in Twitter support forum API may have been exploited by state-sponsored hackers. Meanwhile, other hackers embedded code in memes posted on Twitter to give infected PCs instructions.

paper bomb

Sextortion group behind bomb threat spam campaign

The mass-emailed bomb threats, which demanded bitcoin payments, seem to have come from a sextortion group.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

google pixel slate keyboard with hands2

What is a keylogger? How attackers can monitor everything you type

Keystroke logging software is one of the oldest forms of malware, dating back to typewriters. It's still popular and often used as part of larger cyber attacks.

pc antivirus

Best antivirus software: 14 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

phishing hacker binary keyboard privacy security breach

Hacker adds malicious bitcoin-stealing code to popular JavaScript library

An NPM package with 2 million weekly downloads had malicious code injected into it. Plus, more problems arise from the Windows 10 October 2018 Update.

malware attack

Worst malware and threat actors of 2018 so far

Researchers name the worst malware and threat actors of 2018 so far, several vulnerabilities were disclosed, and HSBC Bank reveals it suffered a data breach.

cyber attack virus meltdown

Meaner, more violent Stuxnet variant reportedly hits Iran

Iran admitted its “infrastructure and strategic networks” were hit by a meaner version of Stuxnet. Plus, Iran used Google to find CIA communication channels.

storm disaster recovery disruption rain umbrella tornado challenge weather

Cyber threats fueled by AI: Security's next big challenge

Security has always been an arms race. But the addition of AI is like jumping from tomahawks to Tomahawk missiles.

6 antivirus

Why even the best antivirus software isn't enough (and why you still need it)

Antivirus software can’t keep up with new malware or variants of known malware, but it still plays a role in an overall endpoint protection strategy.

botnet security computer code

New vicious Torii IoT botnet discovered

Move over, Mirai. There’s a new, much more sophisticated IoT botnet boss. The Torii IoT botnet has advanced techniques and persistence methods.

vulnerable cryptojacking hacking breach security

First known malicious cryptomining campaign targeting Kodi discovered

Add-ons for Kodi, the media streaming app, have been infected with malware that mines Monero and may continue to do so unless you take action.

sony pictures movie

The Sony hacker indictment: 5 lessons for IT security

The recent indictment of North Korean hacker Park Jin Hyok contains valuable information from the FBI’s investigation that will help you defend against similar attacks.

9 mobile threats spyware malware unsecured wireles

Sophisticated mobile spyware Pegasus found in the US and 44 other countries

Ten Pegasus operators deployed the Pegasus spyware for cross-border surveillance and may be violating U.S. law.

botnet bots

What is a botnet? And why they aren't going away anytime soon

A botnet is a collection of any type of internet-connected device that an attacker has compromised. Commonly used in distributed denial of service (DDoS) attacks, botnets can also take advantage of their collective computing power to...

1 intro security executive thinking woman face binary

12 things every IT security professional should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

Load More