Malware

Malware news, analysis, research, how-to, opinion, and video.

Android mobile phone

Dark Caracal: Hacking group targets Android smartphones

An advanced persistent threat (APT) group named Dark Caracal used Android spyware to steal hundreds of gigabytes of sensitive data from more than 21 countries.

Android mobile phone

Skygofree: Powerful Android spyware with advanced surveillance tools

Android spyware has advanced surveillance capabilities, including turning on the mic when the victim enters specific geolocations.

world threat disaster detection doomsday

Mirai Okiru: New DDoS botnet targets ARC-based IoT devices

Meet Mirai Okiru and brace for the DDoS botnet targeting 'billions' of ARC-based IoT devices.

data security encryption

Cisco ETA solves one of the biggest cybersecurity problems

Cisco Encrypted Traffic Analysis (ETA), now generally available, addresses one of the biggest pain points in the cybersecurity industry — finding malware in encrypted traffic.

cybersecurity

More cybersecurity drama, but some hope for defenders in 2018

And this for the short descriptive sentence: From fileless malware attacks to attack attribution becoming more complex, 2018 won't offer less security drama. But there's still good reason for security professionals to be optimistic...

malware cybersecurity skull crossbone

Loapi malware capable of destroying Android phones

Kaspersky researchers discovered malware capable of cryptocurrency mining, launching DDoS attacks and so much more that it destroyed an Android phone after two days.

pc antivirus

The best antivirus? Kaspersky leads in latest tests, but that's only part of the story

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, antivirus tools still play an important role in the enterprise security strategy.

crystal ball

A few cybersecurity predictions for 2018

Look for cloud computing chaos, high-end services, technology consolidation/integration, machine learning ubiquity, and a GDPR mess.

data breach predictions

Top 5 cybersecurity concerns for 2018

These predictions are just a handful of the many threats we'll see. Our solutions need to evolve with the threats and provide multiple layers of protection

botnet bots

What is a botnet? And why they aren't going away anytime soon

Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.

ransomware hack

2018: The year of advanced threat prevention

In 2018, leading organizations will adopt new technologies to help them decrease the attack surface and block attacks in real time.

2 linux malware scarier

Linux antivirus and anti malware: 8 top tools

Malware and viruses on a Linux system? You weren’t operating under the illusion that using Linux meant you don’t have to worry about that, were you? Fake news!

astract code [Thinkstock]

Web-based malware: not up to code

Enterprises not actively managing this third-party digital risk face significant harm in the current regulatory environment around data compliance.

salted hash ep7 primary image

Salted Hash Ep 7: Matrix Banker malware and insider threats

This week's episode of Salted Hash takes a look at insider threats and the return of Matrix Banker, a family of malware that is targeting organizations in Mexico. Our guest is Justin Fier, the director for cyber intelligence and...

dark web hacker tablet malware

The Darwin defense: can ‘genetic algorithms’ outsmart malware?

Coming to a future near you: software code that mutates and evolves.

phishing hack scam malware binary code

Is fake news dangerous? Security pros say yes

The influx of fake news has taken a social toll, but it is also an attack vector for phishing and malware delivery.

pc antivirus

Bay Dynamics Risk Fabric puts vulnerabilities in context

Many vulnerability management programs will direct IT teams to the critical threat on the non-critical asset, and place a midlevel threat on a critical asset thousands of places down on the priority scale. It’s not the program’s...

ransomware

What is ransomware? How it works and how to remove it

Ransomware is a form of malicious software (or malware) that, once it's taken over your computer, threatens you with harm, usually by denying you access to your data. The attacker demands a ransom from the victim, promising — not...

cyber attack virus meltdown

Crossbow offers live fire cybersecurity vulnerability testing

The vulnerability assessment platform is one of the most realistic tools, but also one of the most dangerous, that CSO has ever reviewed. All of the attacks that it can load or create are real, using actual techniques and tactics...

bug malware infected virus

Infected with malware? Check your Windows registry

Auditing your registry can turn up telltale signs on malware infection. Here's how to monitor the registry keys that matter using Microsoft's Sysinternals Autoruns.

Load More