Malware

Malware | News, how-tos, features, reviews, and videos

pc antivirus
botnet bots

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

1 intro security executive thinking woman face binary

12 things every IT security professional should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

binary code, magnifying lens, skull and crossbones

What is malware? Viruses, worms, trojans, and beyond

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

salted hash thumbnail multi final
video

Conversation hijacking attacks | Salted Hash Ep 38

Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.

security risk - phishing / malware / social engineering

What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders

With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.

bunch of toy robots

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet

Mirai took advantage of insecure IoT devices in a simple but clever way. It scanned big blocks of the internet for open Telnet ports, then attempted to log in default passwords. In this way, it was able to amass a botnet army.

nup 177120 0001

Security lessons from the 2018 Pyeongchang Winter Olympics

Shiny buttons that go "ping!" considered harmful.

android malware

Skygofree: More Android malware malarkey

A lot of Android virus and malware stories are hooey. Skygofree is a prime example.

1 ceo target threat

Safeguarding your biggest cybersecurity target: Executives

Top execs make big targets, especially when traveling abroad. Here’s how to protect C-level officers from whaling, espionage, and themselves.

2 linux malware scarier

Linux antivirus and anti malware: 8 top tools

Malware and viruses on a Linux system? You weren’t operating under the illusion that using Linux meant you don’t have to worry about that, were you? Fake news!

human weak link cybersecurity primary

5 information security threats that will dominate 2018

The global security threat outlook evolves with every coming year. To combat the threat in 2018, enterprises must understand these five global cyber threats.

ransomware

What is ransomware? How it works and how to remove it

Ransomware is a form of malicious software (or malware) that, once it's taken over your computer, threatens you with harm, usually by denying you access to your data. The attacker demands a ransom from the victim, promising — not...

security disasters intro

12 famous (and infamous) IT security disasters

Arrogance and excessive pride may be the deadly sins of IT security

05 malware

Famous malware threats: Where are they now?

The headlines may be dominated by news of NotPeyta and Wannacry, but watch out for the ‘golden oldie’ malware like Conficker and Zeus. They are still dangerous.

Locky Ransomware infects a Windows 10 computer

Inside the thriving ransomware market

Researchers at Carbon Black examined the Ransomware market and discovered some interesting facts about the booming criminal economy. Mirroring some of the legal technology markets, such as those for software development, the market...

petya ransomware logo

Petya ransomware and NotPetya malware: What you need to know now

NotPetya superficially resembles the Petya ransomware in several ways, but there are a number of important ways in which it's different, and much more dangerous.

10 threat landscape apocalypse ruins

How to survive the worsening cyber threat landscape

Industry and government cybersecurity experts offer advice for protecting business assets and reputation in an increasingly dangerous cyber threat landscape.

artificial intelligence / machine learning / network

How AI can stop tomorrow's malware threats today

New AI-based security takes the malware fight to the attackers.

Load More