Malware

Malware news, analysis, research, how-to, opinion, and video.

network security primary2

Why it’s harder for threats to hide behavior on a corporate network

If signatures in cybersecurity are like fingerprints in a criminal investigation, behavioral detection is like profiling – it’s harder to hide, but it’s not foolproof either.

domain name systems dns

Experts are predicting automated lateralization attacks against Windows domains

Here’s how to prepare...

23922465470 fe3c8b8cdf o

The 17 biggest data breaches of the 21st century

Security practitioners weigh in on the 17 worst data breaches in recent memory.

ransomware data laptop

Hackers lure victims with fake cryptocurrency SpriteCoin

Beware of the SpriteCoin double whammy: The fake cryptocurrency installs ransomware and more malware if the ransom is paid.

security training ts

Are bad analogies killing your security training program?

Humans make irrational decisions under pressure. Security training needs to focus on changing behavior, not just raising awareness. Using effective analogies can help.

Android mobile phone

Dark Caracal: Hacking group targets Android smartphones

An advanced persistent threat (APT) group named Dark Caracal used Android spyware to steal hundreds of gigabytes of sensitive data from more than 21 countries.

Android mobile phone

Skygofree: Powerful Android spyware with advanced surveillance tools

Android spyware has advanced surveillance capabilities, including turning on the mic when the victim enters specific geolocations.

world threat disaster detection doomsday

Mirai Okiru: New DDoS botnet targets ARC-based IoT devices

Meet Mirai Okiru and brace for the DDoS botnet targeting 'billions' of ARC-based IoT devices.

data security encryption

Cisco ETA solves one of the biggest cybersecurity problems

Cisco Encrypted Traffic Analysis (ETA), now generally available, addresses one of the biggest pain points in the cybersecurity industry — finding malware in encrypted traffic.

cybersecurity

More cybersecurity drama, but some hope for defenders in 2018

And this for the short descriptive sentence: From fileless malware attacks to attack attribution becoming more complex, 2018 won't offer less security drama. But there's still good reason for security professionals to be optimistic...

malware cybersecurity skull crossbone

Loapi malware capable of destroying Android phones

Kaspersky researchers discovered malware capable of cryptocurrency mining, launching DDoS attacks and so much more that it destroyed an Android phone after two days.

crystal ball

A few cybersecurity predictions for 2018

Look for cloud computing chaos, high-end services, technology consolidation/integration, machine learning ubiquity, and a GDPR mess.

data breach predictions

Top 5 cybersecurity concerns for 2018

These predictions are just a handful of the many threats we'll see. Our solutions need to evolve with the threats and provide multiple layers of protection

botnet bots

What is a botnet? And why they aren't going away anytime soon

Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.

ransomware hack

2018: The year of advanced threat prevention

In 2018, leading organizations will adopt new technologies to help them decrease the attack surface and block attacks in real time.

2 linux malware scarier

Linux antivirus and anti malware: 8 top tools

Malware and viruses on a Linux system? You weren’t operating under the illusion that using Linux meant you don’t have to worry about that, were you? Fake news!

astract code [Thinkstock]

Web-based malware: not up to code

Enterprises not actively managing this third-party digital risk face significant harm in the current regulatory environment around data compliance.

salted hash ep7 primary image

Salted Hash Ep 7: Matrix Banker malware and insider threats

This week's episode of Salted Hash takes a look at insider threats and the return of Matrix Banker, a family of malware that is targeting organizations in Mexico. Our guest is Justin Fier, the director for cyber intelligence and...

dark web hacker tablet malware

The Darwin defense: can ‘genetic algorithms’ outsmart malware?

Coming to a future near you: software code that mutates and evolves.

phishing hack scam malware binary code

Is fake news dangerous? Security pros say yes

The influx of fake news has taken a social toll, but it is also an attack vector for phishing and malware delivery.

Load More