Malware

Malware | News, how-tos, features, reviews, and videos

skull and crossbones in binary code

GandCrab attackers exploit recently patched Confluence vulnerability

If your company uses Confluence, make sure you have the latest available patches for this vulnerability.

6 handling email phishing

Wipro breach highlights third-party risk from large IT services providers

After outsourcing giant Wipro suffered a phishing incident, attackers used its email system to target the company’s customers. The breach demonstrates the dangers of supply chain and third party risk.

binary code, magnifying lens, skull and crossbones

Outside-the-box malware is getting more common, security researchers warn

Malware authors have been experimenting with unusual malware formats, and this presents new challenges for the security industry.

trojan horse virus

What is Emotet? And how to guard against this persistent Trojan malware

The Emotet Trojan is one of the biggest malware threats in recent years. Here's what you can do to safeguard your business.

security threats and vulnerabilities

New TajMahal APT discovered by Kaspersky has one known victim, likely others

Active since August 2014 with 80 modules able to capture a variety of information but with only one known victim, the TajMahal APT seems too advanced not to be used just once.

6 antivirus

What your antivirus software doesn’t tell you, and how to get that data

Antivirus software detects and removes malware, but how fast and how accurate? Here's no-cost way to find out and hold antivirus vendors accountable.

CSO: Have you met these hackers? [slide 04]

What is spyware? How it works and how to prevent it

Spyware is a broad category of malware designed to secretly observe activity on a device and send those observations to a snooper. It is used by everyone from nation states to jealous spouses.

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

ASUS users fall victim to supply chain attack through backdoored update

Attackers hijack ASUS's auto-update process to deliver malware. Preventing such attacks is difficult, but vendors and their customers can do more to mitigate the risk.

malvertising malware hacked ads advertising online

What is malvertising? And how to protect against it

Malvertising, the practice of sprinkling malicious code to legitimate-looking ads, affects both small and large websites. Protecting against it is harder than it seems.

crowd blur people walking conference group diverse crowd

My two favorite companies from RSA Conference 2019

The Media Trust offers website owners a way to detect malicious code coming from third parties, and DarkOwl scans the dark web for signs that a company has been compromised.

ransomware

Is the world ready for the next big ransomware attack?

WannaCry and NotPetya brought major companies to their knees and cost billions to remediate. A new report from Lloyds of London warns another similar ransomware attack would still be devastating.

malware cybersecurity skull crossbone

Qbot malware resurfaces in new attack against businesses

This new persistent and difficult-to-detect Qbot version is designed to steal financial information.

vulnerable cryptojacking hacking breach security

Attackers place cryptojacking apps in the Microsoft App Store

Microsoft has removed eight applications from its app store for Windows that were mining Monero cryptocurrency without users' knowledge.

05 malware

How to identify, prevent and remove rootkits in Windows 10

Rootkits are among the most difficult malware to detect and remove. Now, new variations are targeting Windows 10 systems. Use this advice to protect yourself from them.

binary code, magnifying lens, skull and crossbones

Beware of phony or misleading malware rescue web pages

A search on an unfamiliar executable file brings you to a malware rescue page that says it's bad and you should download their software to remove. Here's how to tell if it's real.

security vulnerabilities in the IoT Internet of Things

SQL Slammer 16 years later: Four modern-day scenarios that could be worse

Nothing has ever come close to the speed at which the SQL Slammer worm took down networks. These very possible scenarios might beat it in terms of speed and damage.

3 types of malware computer virus trojan horse  worm

Ursnif Trojan is back with fileless persistence

Also known as Dreambot, this new variant can deploy GandCrab ransomware through Microsoft Word macros.

vulnerable cryptojacking hacking breach security

Rocke coinminer disables cloud protection agents

Cryptojacker's new shell script A7 can remove cloud security agents from Alibaba and Tencent to avoid coinminer detection.

The 18 biggest data breaches of the 21st century

Security practitioners weigh in on the 18 worst data breaches in recent memory.

ransomware

What is ransomware? 4 steps to prevent these file-locking attacks

Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment. 

Load More