Malware news, analysis, research, how-to, opinion, and video.

Android apps (2)
ransom note letters


Got ransomware? These tools may help

Ransomware on your system and no backups? Ouch. Check out publicly available decryptor tools and see if they can save you

cyber warfare war

U.S. cyberwar against ISIS could use methods and tactics criminals use against enterprises

Attacks could support traditional military operations or open up a new front

spying eye

Cyberespionage group abuses Windows hotpatching mechanism to hide malware

The Platinum cyberespionage group has been leveraging a Windows feature known as hotpatching to inject malicious code into running processes

150817 google marshmallow 03

Malvertising attack silently infects old Android devices with ransomware

The Web-based malware attack uses Towelroot and a Hacking Team exploit to compromise devices running old versions of Android

stack of padded envelopes with the red urgent sticker

Patch JBoss now to prevent SamSam ransomware attacks

Cisco Talos has identified millions of vulnerable JBoss servers that can potentially be infected with SamSam ransomware

A mug with the words GitHub Social Coding

19 open source GitHub projects for security pros

GitHub has a ton of open source options for security professionals, with new entries every day. Add these tools to your collection and work smarter

jigsaw ransomware logo

Jigsaw crypto-ransomware deletes more files the longer you delay paying

Malware researchers have released a tool that can decrypt files affected by the new threat

petya ransomware logo

Companies increasingly yield to ransomware demands

That strategy may only embolden cybercriminals, who view stolen or encrypted data as a powerful weapon

petya ransomware logo

Experts crack Petya ransomware, enable hard drive decryption for free

The technique is not exactly straightforward, but it works

Security online

Adobe fixes 24 vulnerabilities in Flash Player, including an actively exploited one

The new Flash Player update squashes a bug that hackers have been using to infect computers with ransomware

legal gavel

JavaScript founder Brendan Eich's company could face legal action

Major content providers object to Brave Software's business model; Brave counters it's 'not the enemy'


Server software poses soft target for ransomware

The Samsam ransomware has spread by attacking unpatched JBoss application servers, Symantec says

malware infection cyberattack

Digital certificates are helping deliver malware

When digital certs go bad, whom can you trust? Follow these procedures to get as much assurance as you can

security code big data cyberespionage DDoS

Custom-developed Dripion backdoor used for targeted attacks in Asia, U.S.

The malware may be linked to a known cyberespionage group that targets companies with interests in Taiwan

bitdefender anti ransomware vaccine

Free Bitdefender tool prevents Locky, other ransomware infections -- for now

The tool tricks Locky, TeslaCrypt, and CTB-Locker ransomware into believing that computers are already infected

petya ransomware logo

Petya ransomware overwrites MBRs, locking users out of their computers

The ransomware is distributed by emails masquerading as job applications

Windows PowerShell logo

New ransomware abuses Windows PowerShell, Word document macros

The PowerWare ransomware is written completely in the Windows PowerShell scripting language

USB Trojan hides in portable applications, targets air-gapped systems

The stealthy USB Thief Trojan makes extensive use of cryptography to hinder analysis and hide data

Load More