Malware news, analysis, research, how-to, opinion, and video.

security lock code
Common crypto mistakes criminals makes

malware payment terminal credit card

Dyre banking Trojan successor rears its ugly head

New online banking Trojan TrickBot is believed to be a reimplementation of Dyre

dahua cams

IoT botnet highlights the dangers of default passwords

The Mirai botnet used IoT devices to launch a massive DDOS attack

sofacy 1

New Mac Trojan uses the Russian space program as a front

The Komplex Trojan can download, execute, and delete files from an infected Mac

120215 hacker

Seagate NAS hack should scare us all

An under-the-radar news story proves that computers are far from the only devices prey to attack

ransomware locked computer stock image cropped

A single ransomware network has pulled in $121 million

A ransomware author was able to collect $121 million in ransomware payments during the first half of this year

segate central NAS

Thousands of Seagate NAS boxes host cryptocurrency mining malware

If configured for remote access, the devices expose a writable FTP directory to the Internet that attackers can abuse

4120913056 d1931898b4 o

Crafty GovRAT malware is growing, targeting U.S. government employees

The GovRAT malware, designed to bypass antivirus tools, has been upgraded

malware attack cyberespionage code hacker

Stealthy, tricky-to-remove rootkit targets Linux systems on ARM and x86

The Umbreon rootkit runs from user mode but hijacks libc system calls

code big data binary programming

Sophos false positive detection ruins weekend for some Windows users

Sophos antivirus products detected winlogon.exe as malicious, preventing some users from accessing their computers

OS X El Capitan installation

BitTorrent client is found distributing Mac-based malware

Months earlier, the Transmission BitTorrent client was found distributing Mac-based ransomware

bubble man data shield attack binary code

Review: SentinelOne blocks and dissects threats

SentinelOne EPP brings good malware detection, excellent forensics, and flexible remediation to business networks

Digital Key, security, encryption

New ransomware threat deletes files from Linux web servers

Attackers claim the files are first encrypted and uploaded to a server under their control

hollywood sign

Hollywood's 5 biggest hacking myths

Press Enter and watch the magic happen -- as if! Why does Hollywood's portrayal of hacking have to be so far off the mark?

ios 9.3

Apple patches iOS security flaws found in spyware targeting activist

Government-hired hackers used three previously unknown vulnerabilities in Apple's iOS to target an activist in the United Arab Emirates

NSA headquarters

Alleged NSA data dump contains sophisticated hacking tools

Cisco said that the sample files reveal an undetected software flaw in its products

party favors

6 security advances worth celebrating

In a world besieged by criminal hackers, we'll take all the good security news we can get. Here are six advances that can improve your defenses

New features in Windows 10 laptop

Respect: Windows 10 security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

Digital Key, security, encryption

Researcher hides stealthy malware inside legitimate digitally signed files

A new technique allows attackers to hide malicious code inside digitally signed files without breaking their signatures and then to load that code directly into the memory of another process.

Load More