Malware

Malware | News, how-tos, features, reviews, and videos

The 18 biggest data breaches of the 21st century

Security practitioners weigh in on the 18 worst data breaches in recent memory.

ransomware

What is ransomware? How these attacks work and how to recover from them

Ransomware is a form of malicious software (or malware) that, once it's taken over your computer, threatens you with harm, usually by denying you access to your data. The attacker demands a ransom from the victim, promising — not...

Twitter

Twitter bug may have been exploited by state-sponsored hackers

A flaw in Twitter support forum API may have been exploited by state-sponsored hackers. Meanwhile, other hackers embedded code in memes posted on Twitter to give infected PCs instructions.

paper bomb

Sextortion group behind bomb threat spam campaign

The mass-emailed bomb threats, which demanded bitcoin payments, seem to have come from a sextortion group.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

google pixel slate keyboard with hands2

What is a keylogger? How attackers can monitor everything you type

Keystroke logging software is one of the oldest forms of malware, dating back to typewriters. It's still popular and often used as part of larger cyber attacks.

phishing hacker binary keyboard privacy security breach

Hacker adds malicious bitcoin-stealing code to popular JavaScript library

An NPM package with 2 million weekly downloads had malicious code injected into it. Plus, more problems arise from the Windows 10 October 2018 Update.

malware attack

Worst malware and threat actors of 2018 so far

Researchers name the worst malware and threat actors of 2018 so far, several vulnerabilities were disclosed, and HSBC Bank reveals it suffered a data breach.

cyber attack virus meltdown

Meaner, more violent Stuxnet variant reportedly hits Iran

Iran admitted its “infrastructure and strategic networks” were hit by a meaner version of Stuxnet. Plus, Iran used Google to find CIA communication channels.

storm disaster recovery disruption rain umbrella tornado challenge weather

Cyber threats fueled by AI: Security's next big challenge

Security has always been an arms race. But the addition of AI is like jumping from tomahawks to Tomahawk missiles.

6 antivirus

Why even the best antivirus software isn't enough (and why you still need it)

Antivirus software can’t keep up with new malware or variants of known malware, but it still plays a role in an overall endpoint protection strategy.

botnet security computer code

New vicious Torii IoT botnet discovered

Move over, Mirai. There’s a new, much more sophisticated IoT botnet boss. The Torii IoT botnet has advanced techniques and persistence methods.

vulnerable cryptojacking hacking breach security

First known malicious cryptomining campaign targeting Kodi discovered

Add-ons for Kodi, the media streaming app, have been infected with malware that mines Monero and may continue to do so unless you take action.

sony pictures movie

The Sony hacker indictment: 5 lessons for IT security

The recent indictment of North Korean hacker Park Jin Hyok contains valuable information from the FBI’s investigation that will help you defend against similar attacks.

9 mobile threats spyware malware unsecured wireles

Sophisticated mobile spyware Pegasus found in the US and 44 other countries

Ten Pegasus operators deployed the Pegasus spyware for cross-border surveillance and may be violating U.S. law.

1 intro security executive thinking woman face binary

12 things every IT security professional should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

20160224 stock mwc internet of things iot sign

Mirai leveraging Aboriginal Linux to target multiple platforms

The Mirai botnet hasn't gone away, you don't hear about it much, but the code has been constantly updated and maintained. Recently, Symantec's Dinesh Venkatesan discovered a command and control (C&C) server hosting various types of...

An Android mascot carrying an umbrella in the rain. / firewall / security / coverage / service

Android 'Triout' spyware records calls, sends photos and text messages to attackers

Researchers identified new Android spyware with extensive surveillance capabilities being bundled into legitimate apps.

security vulnerabilities in the IoT Internet of Things

Here I am, hack me

Bad actors are constantly trying to find ways to penetrate our networks. Recent attacks at LabCorp and the City of Atlanta demonstrate, however, that we are putting the welcome mat out for hackers by leaving key network ports open. ...

artificial intelligence / machine learning / network

Weaponized AI and facial recognition enter the hacking world

Your face could trigger a DeepLocker AI-powered malware attack or be used by Social Mapper to track you across social media sites.

Load More