Malware

Malware news, analysis, research, how-to, opinion, and video.

security automation robot
How You Will Get Hacked Next

dsc05783

Experts at RSA give their best cybersecurity advice

Users and businesses can protect themselves with these tips

petya ransomware logo

Experts worried about ransomware hitting critical infrastructure

Expect ransomware to grow more aggressive in the coming years, including higher ransom payments and attempts to go beyond attacking data -- by shutting down entire computer systems to utilities or factories.

ransomware data laptop

Ransomware soars in 2016, while malware declines

IoT exploits continue to be a threat, SonicWall report says

03 shipping malware

Sniff out and kick out Windows malware for free

Like it or not, your PC is susceptible to malware. These videos will teach you how to locate the bad stuff, then remove it from your system

Digital Key encryption

Ransomware disrupts Washington DC's CCTV system

Ransomware attacks target various types of systems and businesses and are unlikely to stop

05 tools

The essential guide to antimalware tools

Admins can choose from a bevy of secondary scanners and specialized tools to clean up infected or infested PCs

ransomware at your service 1

The evolution of (and solution to) ransomware

Ransomware has become the scourge of the internet 28 years after it first appeared. Here's how to prevent infection and recover if you're hit

video

How to Clean-install Windows without Bloatware

You can get rid of bloatware or other troublesome software by doing a clean install of Windows 10. Here’s how it works.

security code big data cyberespionage byte

After MongoDB, ransomware groups hit exposed Elasticsearch clusters

Over 600 Elasticsearch instances had their data wiped and replaced with a ransom message

Digital Key encryption

Professionally designed ransomware Spora might be the next big thing

Security researchers have found a new very well designed ransomware program dubbed Spora that can perform strong offline file encryption and brings several innovations to the ransom payments model.

code hacker cyberespionage eye data

Disk-wiping malware Shamoon targets virtual desktop infrastructure

The latest variant of the cyber sabotage program has default credentials for a Huawei desktop virtualization solution

ransomware data laptop

MongoDB ransomware attacks sign criminals are going after servers, applications

Ransomware is lucrative, and attackers looking for new ways to extort enterprises are going after data stored on web and app servers, even SaaS apps

security code big data cyberespionage byte

More than 10,000 exposed MongoDB databases deleted by ransomware groups

Five groups of attackers are competing to delete as many publicly accessible MongoDB databases as possible

ransomware locked computer stock image cropped

Security expert: Ransomware took in $1 billion in 2016

And improved defenses may not be enough to stem the tide

ransomware data laptop

Exposed MongoDB installs being erased, held for ransom

Administrators should check their MongoDB deployments before they’re wiped clean

man with online security key

5 signs we're finally getting our act together on security

Despite all the bad news in information security in 2016, some positive developments may finally shift momentum

encryption security Android

Mobile banking trojans adopt ransomware features

Two Android trojans that steal financial information and login credentials now double as file-encrypting ransomware programs

Network servers datacenter

Nearly half of all websites pose security risks

According to a new study of the top one million domains, 46 percent have security problems

Load More