Malware

Malware news, analysis, research, how-to, opinion, and video.

security code big data cyberespionage byte
Digital Key encryption

code hacker cyberespionage eye data

Disk-wiping malware Shamoon targets virtual desktop infrastructure

The latest variant of the cyber sabotage program has default credentials for a Huawei desktop virtualization solution

ransomware data laptop

MongoDB ransomware attacks sign criminals are going after servers, applications

Ransomware is lucrative, and attackers looking for new ways to extort enterprises are going after data stored on web and app servers, even SaaS apps

security code big data cyberespionage byte

More than 10,000 exposed MongoDB databases deleted by ransomware groups

Five groups of attackers are competing to delete as many publicly accessible MongoDB databases as possible

ransomware locked computer stock image cropped

Security expert: Ransomware took in $1 billion in 2016

And improved defenses may not be enough to stem the tide

ransomware data laptop

Exposed MongoDB installs being erased, held for ransom

Administrators should check their MongoDB deployments before they’re wiped clean

man with online security key

5 signs we're finally getting our act together on security

Despite all the bad news in information security in 2016, some positive developments may finally shift momentum

encryption security Android

Mobile banking trojans adopt ransomware features

Two Android trojans that steal financial information and login credentials now double as file-encrypting ransomware programs

Network servers

Nearly half of all websites pose security risks

According to a new study of the top one million domains, 46 percent have security problems

20160225 stock mwc ericsson booth security locks

Ransomware attacks against businesses increased threefold in 2016

Kaspersky Lab recorded one ransomware attack every 40 seconds against companies in September

cryptolocker -ransomware - flickr

Fighting ransomware: A fresh look at Windows Server approaches

This electronic evil won't just fade away on its own. Here are a few things you can do

malware attack cyberespionage code hacker

San Francisco's Muni says server data not accessed in ransomware hit

The alleged ransomware attacker has reportedly threatened to release data stolen from the transit system

hacker, hack, hacking

San Francisco’s Muni transit system reportedly hit by ransomware

The ransomware attacker is said to be demanding $73,000

hacker hacked unsecure theft passwords

17 essential tools to protect your online identity, privacy

From secure chips to anonymity services, here’s how to stay safe and private on the web

security lock code

Windows GDI flaw leads to PowerShell attacks

APT group FruityArmor exploited Windows GDI memory handling to break out of browser sandboxes and launch PowerShell in targeted attacks

Common crypto mistakes criminals makes

Stupid encryption mistakes criminals make

Blown cover: Malware authors show how easy it is to get encryption wrong and, in the process, help security pros crack their code

malware payment terminal credit card

Dyre banking Trojan successor rears its ugly head

New online banking Trojan TrickBot is believed to be a reimplementation of Dyre

dahua cams

IoT botnet highlights the dangers of default passwords

The Mirai botnet used IoT devices to launch a massive DDOS attack

sofacy 1

New Mac Trojan uses the Russian space program as a front

The Komplex Trojan can download, execute, and delete files from an infected Mac

Load More