Malware

Malware | News, how-tos, features, reviews, and videos

lmt booth mwc 2018

Latvian mobile operator invites cyber attackers to have a go

Security researchers wanting to test the kind of malware that could break public networks now have a place to do so in safety.

bunch of toy robots

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet

Mirai took advantage of insecure IoT devices in a simple but clever way. It scanned big blocks of the internet for open Telnet ports, then attempted to log in default passwords. In this way, it was able to amass a botnet army.

pirate flag pirates piracy

Flight simulator add-on used malware to steal pirates' passwords

Gamers are not happy that Flight Sim Labs added malware to the A320-X flight simulator add-on -- meant to be used with Microsoft Flight Simulator X and Prepar3D 3.0 -- in an effort to stop software pirates.

abstract FinTech image of a dollar sign referencing digital transactions and potentially blockchain

Hackers exploit Jenkins servers, make $3 million by mining Monero

Hackers exploiting Jenkins servers made $3 million in one of the biggest malicious cryptocurrency mining operations ever.

north korea statue pyongyang

North Korea hacking group is expanding operations, researchers say

A group of hackers from North Korea (DPRK), recently connected to the usage of an Adobe Flash zero-day vulnerability (CVE-2018-4878), has expanded its operations in both scope and sophistication, FireEye says.

cat hiding box hide and seek

How to protect your network from PowerShell exploits

PowerShell is a powerful and versatile tool for both Windows sysadmins and hackers, who use it to build malicious scripts that avoid detection. This advice will make it harder for them to do so.

nup 177120 0001

Security lessons from the 2018 Pyeongchang Winter Olympics

Shiny buttons that go "ping!" considered harmful.

steal theft hacker crime laptop firewall

Who Is watching the watchers?

The Kaseya event should serve as a wake-up call for companies that fail to scrutinize the security standards of their vendors—including their security vendors!

network security primary2

Why it’s harder for threats to hide behavior on a corporate network

If signatures in cybersecurity are like fingerprints in a criminal investigation, behavioral detection is like profiling – it’s harder to hide, but it’s not foolproof either.

dsc04854

Buggy Malwarebytes protection update wreaks havoc for users

Malwarebytes pushed out a protection update that gobbled up memory and CPU resources and turned off web protection; the first fix still left users with unusable or crashing computers, but the latest release resolved the issue.

domain name systems dns

Experts are predicting automated lateralization attacks against Windows domains

Here’s how to prepare...

23922465470 fe3c8b8cdf o

The 17 biggest data breaches of the 21st century

Security practitioners weigh in on the 17 worst data breaches in recent memory.

ransomware data laptop

Hackers lure victims with fake cryptocurrency SpriteCoin

Beware of the SpriteCoin double whammy: The fake cryptocurrency installs ransomware and more malware if the ransom is paid.

security training ts

Are bad analogies killing your security training program?

Humans make irrational decisions under pressure. Security training needs to focus on changing behavior, not just raising awareness. Using effective analogies can help.

Android mobile phone

Dark Caracal: Hacking group targets Android smartphones

An advanced persistent threat (APT) group named Dark Caracal used Android spyware to steal hundreds of gigabytes of sensitive data from more than 21 countries.

Android mobile phone

Skygofree: Powerful Android spyware with advanced surveillance tools

Android spyware has advanced surveillance capabilities, including turning on the mic when the victim enters specific geolocations.

world threat disaster detection doomsday

Mirai Okiru: New DDoS botnet targets ARC-based IoT devices

Meet Mirai Okiru and brace for the DDoS botnet targeting 'billions' of ARC-based IoT devices.

data security encryption

Cisco ETA solves one of the biggest cybersecurity problems

Cisco Encrypted Traffic Analysis (ETA), now generally available, addresses one of the biggest pain points in the cybersecurity industry — finding malware in encrypted traffic.

cybersecurity

More cybersecurity drama, but some hope for defenders in 2018

And this for the short descriptive sentence: From fileless malware attacks to attack attribution becoming more complex, 2018 won't offer less security drama. But there's still good reason for security professionals to be optimistic...

malware cybersecurity skull crossbone

Loapi malware capable of destroying Android phones

Kaspersky researchers discovered malware capable of cryptocurrency mining, launching DDoS attacks and so much more that it destroyed an Android phone after two days.

Load More