Malware

Malware | News, how-tos, features, reviews, and videos

nup 177120 0001

Security lessons from the 2018 Pyeongchang Winter Olympics

Shiny buttons that go "ping!" considered harmful.

android malware

Skygofree: More Android malware malarkey

A lot of Android virus and malware stories are hooey. Skygofree is a prime example.

1 ceo target threat

Safeguarding your biggest cybersecurity target: Executives

Top execs make big targets, especially when traveling abroad. Here’s how to protect C-level officers from whaling, espionage, and themselves.

2 linux malware scarier

Linux antivirus and anti malware: 8 top tools

Malware and viruses on a Linux system? You weren’t operating under the illusion that using Linux meant you don’t have to worry about that, were you? Fake news!

human weak link cybersecurity primary

5 information security threats that will dominate 2018

The global security threat outlook evolves with every coming year. To combat the threat in 2018, enterprises must understand these five global cyber threats.

security disasters intro

12 famous (and infamous) IT security disasters

Arrogance and excessive pride may be the deadly sins of IT security

05 malware

Famous malware threats: Where are they now?

The headlines may be dominated by news of NotPeyta and Wannacry, but watch out for the ‘golden oldie’ malware like Conficker and Zeus. They are still dangerous.

Locky Ransomware infects a Windows 10 computer

Inside the thriving ransomware market

Researchers at Carbon Black examined the Ransomware market and discovered some interesting facts about the booming criminal economy. Mirroring some of the legal technology markets, such as those for software development, the market...

petya ransomware logo

Petya ransomware and NotPetya malware: What you need to know now

NotPetya superficially resembles the Petya ransomware in several ways, but there are a number of important ways in which it's different, and much more dangerous.

10 threat landscape apocalypse ruins

How to survive the worsening cyber threat landscape

Industry and government cybersecurity experts offer advice for protecting business assets and reputation in an increasingly dangerous cyber threat landscape.

artificial intelligence / machine learning / network

How AI can stop tomorrow's malware threats today

New AI-based security takes the malware fight to the attackers.

malware cybersecurity skull crossbone

What is a fileless attack? How hackers invade systems without installing software

Cyber criminals don't need to place malware on your system to get in. Fileless or zero-footprint attacks use legitimate applications or even the operating system.

bos17 networking security lg

Bossie Awards 2017: The best networking and security software

InfoWorld picks the top open source software for protecting networks and their users

natanz nuclear facility Iran

What is Stuxnet, who created it and how does it work?

Stuxnet is an extremely sophisticated computer worm that exploits multiple previously unknown Windows zero-day vulnerabilities to infect computers and spread. Its purpose was not just to infect PCs but to cause real-world physical...

img 20170426 133354 01

How to recover from a ransomware attack

Computer infected by ransomware? Don't panic. Follow the step-by-step instructions in this video for your best shot of removing it and recovering your data.

threat ransomware response

The fault for ransomware attacks lies with the challenges security teams face

The realities of managing and protecting IT infrastructures puts IT and security personnel in a no-win situation when attacks like WannaCry or ExPetr occur, so stop blaming them.

pc antivirus

Yes, you still need endpoint malware protection

While operating systems and apps are more secure, the need for endpoint security remains.

8 small business security

How your company needs to train workers in cybersecurity

Businesses are being urged to train their workers to be more vigilant than ever to protect passwords and sensitive data and to recognize threats.

security cameras

Insecure security cameras sound like a joke, but aren’t

They’re an example of big tech companies’ failure to take security seriously.

android security

Most Android devices lack latest security patches

Nearly three-quarters of Android devices on the five biggest U.S. carriers are running on security patches that are at least two months old, putting them at greater risk of being hacked.

Load More