Malware

Malware news, analysis, research, how-to, opinion, and video.

karm
windows 10 hidden revealed

botnet bots

Rival IoT malware clash in a botnet territory battle

The Hajime malware is competing with the Mirai malware to enslave some internet of things devices

ransomware at your service 1

Google tinkers with Android O to foil ransomware

Android O has specific elements to make it harder for ransomware to get a foothold on the device

botnet bots

US dismantles Kelihos botnet after Russian hacker's arrest

Peter Levashov has been accused of running the Kelihos botnet, according to the U.S.

Windows security holes

Word zero-day affects all versions of Office and Windows

Some say McAfee violated 'responsible disclosure' norms when it rushed to disclose the exploit ahead of Microsoft's fix

security code big data cyberespionage byte

IoT malware starts showing destructive behavior

Hackers have started adding data-wiping routines to malware that's designed to infect internet-of-things and other embedded devices.

data breach hacker

Report: 30% of malware is zero-day, missed by legacy antivirus

At least 30 percent of malware today is new, zero-day malware that is missed by traditional antivirus defenses, according to a new report

phishing threat

Phishing scammers exploit Wix web hosting

Criminals flock to free web services to establish their attack infrastructure. The latest example: A group using free website host Wix for its phishing pages

Digital Key encryption

A free decryption tool is now available for all Bart ransomware versions

Antivirus vendor Bitdefender has released a free decryption tool that works for any files affected by the Bart ransomware.

Android Google marshmallow

Notorious iOS spyware has an Android sibling

The Android variant can steal data from messaging apps, spy from a phone’s camera or microphone, and self-destruct

code programming software bugs cybersecurity

Open-source developers targeted in sophisticated malware attack

Attackers have targeted developers present on GitHub since January with an information-stealing program called Dimnie

Fraud gang targeted large European companies

Trojan source code leak could spur new online banking attacks

Nuclear Bot's author releases its source code publicly for other cybercriminals to use

Digital Key encryption

LastPass is scrambling to fix another serious vulnerability

Flaw in the password manager could allow malicious websites to infect computers with malware or steal users' passwords

Mac malware Apple

Malware finds unwitting ally in GitHub

Winnti's abuse of GitHub repository leaves the site in the tricky position of deciding which projects can stay and which ones to shut down

2 two factor

Vastly improve your IT security in 2 easy steps

Losing the battle against the bad guys? Keep your software patched and defend against social engineering, and you might start winning a few

marionette social engineering

6 of the most effective social engineering techniques

It takes a layered approach to technology and added protections and assurances for your people to fight social engineering

security hacker privacy

String of fileless malware attacks possibly tied to single hacker group

Several attacks observed over the past few months that rely heavily on PowerShell, open-source tools and fileless malware techniques, might be the work of a single group of hackers.

cyberattack laptop arrows war fight

How to remove ransomware: Use this battle plan to fight back

Ransomware has exploded onto the PC. We'll show you what to do to avoid it, remove it, and—if necessary—even negotiate with its authors.

security code big data cyberespionage DDoS

Mirai is the hydra of IoT security: too many heads to cut off

Some botnets have been disbanded, but new uses continue to emerge

Load More