Malware

Malware | News, how-tos, features, reviews, and videos

Mac malware Apple

Malware finds unwitting ally in GitHub

Winnti's abuse of GitHub repository leaves the site in the tricky position of deciding which projects can stay and which ones to shut down

marionette social engineering

6 of the most effective social engineering techniques

It takes a layered approach to technology and added protections and assurances for your people to fight social engineering

security hacker privacy

String of fileless malware attacks possibly tied to single hacker group

Several attacks observed over the past few months that rely heavily on PowerShell, open-source tools and fileless malware techniques, might be the work of a single group of hackers.

security code big data cyberespionage DDoS

Mirai is the hydra of IoT security: too many heads to cut off

Some botnets have been disbanded, but new uses continue to emerge

20160225 stock mwc ericsson booth security locks

How much are vendor security assurances worth after the CIA leaks?

Software vendors will fix these vulnerabilities, but users should remember that there are always zero-day exploits out there

diy robot

Bots: Biggest player on the cybercrime block

Bot fraud cost an estimated $31 billion in the US last year, dwarfing the estimated $1 billion lost to ransomware and DDoS attacks

hacker, hackers, hacking

Leaked docs suggest NSA and CIA behind Equation cyberespionage group

With its sophisticated tools and longstanding operations, Equation is considered the most advanced cyberespionage group in the world

cia

CIA false flag team repurposed Shamoon data wiper, other malware

The code reuse was meant to reduce costs of development, but to also make the agency's malware blend in with other threats

Digital Key encryption

Free decryption tools now available for Dharma ransomware

Researchers created decryption tools for the Dharma ransomware after someone recently leaked the decryption keys for the program online

Digital Key encryption

New MacOS ransomware spotted in the wild

A new file-encrypting ransomware program for macOS is being distributed through bittorrent websites and users who fall victim to it won't be able to recover their files, even if they pay.

How You Will Get Hacked Next

Nowhere to hide: 9 new hacks coming to get you

The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm

RSA 2017 cybersecurity conference

Experts at RSA give their best cybersecurity advice

Users and businesses can protect themselves with these tips

petya ransomware logo

Experts worried about ransomware hitting critical infrastructure

Expect ransomware to grow more aggressive in the coming years, including higher ransom payments and attempts to go beyond attacking data -- by shutting down entire computer systems to utilities or factories.

ransomware data laptop

Ransomware soars in 2016, while malware declines

IoT exploits continue to be a threat, SonicWall report says

03 shipping malware

Sniff out and kick out Windows malware for free

Like it or not, your PC is susceptible to malware. These videos will teach you how to locate the bad stuff, then remove it from your system

Digital Key encryption

Ransomware disrupts Washington DC's CCTV system

Ransomware attacks target various types of systems and businesses and are unlikely to stop

05 tools shovels spades

The essential guide to antimalware tools

Admins can choose from a bevy of secondary scanners and specialized tools to clean up infected or infested PCs

security code big data cyberespionage byte

After MongoDB, ransomware groups hit exposed Elasticsearch clusters

Over 600 Elasticsearch instances had their data wiped and replaced with a ransom message

Digital Key encryption

Professionally designed ransomware Spora might be the next big thing

Security researchers have found a new very well designed ransomware program dubbed Spora that can perform strong offline file encryption and brings several innovations to the ransom payments model.

code hacker cyberespionage eye data

Disk-wiping malware Shamoon targets virtual desktop infrastructure

The latest variant of the cyber sabotage program has default credentials for a Huawei desktop virtualization solution

Load More
You Might Also Like