Malware news, analysis, research, how-to, opinion, and video.

rio olympics tickets
fraud infog primary

code big data binary programming

Security software that uses 'code hooking' opens the door to hackers

The flaws allow hackers to easily bypass exploit mitigations in the OS and third-party apps

personal data digital security stock

4 basic security facts everyone should know

The bad news: It's you against an army of cybercriminals around the world. The good news: A little knowledge can provide an effective defense


This Android Trojan blocks the victim from alerting banks

Symantec has noticed a 'call-barring' function in a newer version of Android malware

download progress bar

Spotted! 9 signs of a malicious download

You've heard the advice: Don't download or run software you're unsure of. Here's a quick review of the warning signs to stop you from taking unnecessary risks

dead end street sign road

Angler exploit kit may be dead, but malware lives on

The popular exploit kit behind sophisticated web-based attacks and malvertising is gone, but the bad guys will surely regroup with better crimeware tools

malware infection cyberattack

New Tor-powered backdoor program targets Macs

The Eleanor malware allows attackers to execute commands and scripts, steal and modify files and take pictures using the webcam

click fraud

Why CIOs should care about click fraud

Click fraud is more than just a marketing problem -- it presents a real security risk to your organization, experts say

hardware security embedded circuit board integrated controller

Firmware exploit can defeat new Windows security features on Lenovo ThinkPads

The ThinkPwn zero-day exploit could disable low-level Windows security features like Secure Boot, Virtual Secure Mode, and Credential Guard

endpoint security tools 1

Jeremiah Grossman: Focus on ransomware, SDLC, and endpoints

The noted web security guru worries that the key web and application threats aren't getting the right level of focus

malware 1

Malware Museum's top 10 blasts from the past

From CoffeeShop to Mars Land to LSD, here are the museum's most downloaded viruses

Digital Key, security, encryption

The number of corporate users hit by crypto ransomware is skyrocketing

The prevalence of ransomware programs, both those that encrypt data and those that don't, has exploded over the past two years, with companies being increasingly targeted.

android malware

This Android malware can secretly root your phone and install programs

A new variant of the Godless malware can bypass security checks at app stores like Google Play

cyber security

Block malware, ransomware, and phishing with 5 layers

There's no silver bullet to keeping intruders and hackers out, but you can minimize the risk by combining approaches

padlock and chain, security

Don’t run JS email attachments: ​they​ can carry potent ransomware

A new ransomware program called RAA is entirely written in JavaScript

security hacker

Check your BITS, because deleting malware might not be enough

Rogue Windows Background Intelligent Transfer Service jobs can linger after malware clean-up and re-infect systems

code big data binary programming

Widespread exploits evade protections enforced by Microsoft EMET

Companies should not rely on EMET to delay patching frequently attacked programs

gun laptop ransom

Ransomware demands are working, fueling an increase in attacks

Infoblox DNS Threat Index finds criminals are creating more ransomware-domains than ever, and predicts a continuing increase in attacks as more criminals rush to cash in

Digital Key, security, encryption

New JavaScript spam wave distributes Locky ransomware

European countries are the most affected, but detections have also been recorded in the United States and Canada

Load More