Malware

Malware | News, how-tos, features, reviews, and videos

CSO  >  What is a computer virus?
CSO  >  Botnet  >  Robots amid a blue binary matrix

pc antivirus

Best antivirus software: 14 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

trojan horse malware virus binary by v graphix getty

What is a Trojan horse? How this tricky malware works

A Trojan horse is a type of malware that can wreak havoc on computer networks — but only with your unwitting help.

CSO  >  danger / security threat / malware / binary skull overlaying binary code

What is malware? How to prevent, detect and recover from it

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

skull and crossbones in binary code

GandCrab attackers exploit recently patched Confluence vulnerability

If your company uses Confluence, make sure you have the latest available patches for this vulnerability.

security threats and vulnerabilities

New TajMahal APT discovered by Kaspersky has one known victim, likely others

Active since August 2014 with 80 modules able to capture a variety of information but with only one known victim, the TajMahal APT seems too advanced not to be used just once.

malvertising malware hacked ads advertising online

What is malvertising? And how to protect against it

Malvertising, the practice of sprinkling malicious code to legitimate-looking ads, affects both small and large websites. Protecting against it is harder than it seems.

malware cybersecurity skull crossbone

Qbot malware resurfaces in new attack against businesses

This new persistent and difficult-to-detect Qbot version is designed to steal financial information.

vulnerable cryptojacking hacking breach security

Attackers place cryptojacking apps in the Microsoft App Store

Microsoft has removed eight applications from its app store for Windows that were mining Monero cryptocurrency without users' knowledge.

05 malware

How to identify, prevent and remove rootkits in Windows 10

Rootkits are among the most difficult malware to detect and remove. Now, new variations are targeting Windows 10 systems. Use this advice to protect yourself from them.

3 types of malware computer virus trojan horse  worm

Ursnif Trojan is back with fileless persistence

Also known as Dreambot, this new variant can deploy GandCrab ransomware through Microsoft Word macros.

vulnerable cryptojacking hacking breach security

Rocke coinminer disables cloud protection agents

Cryptojacker's new shell script A7 can remove cloud security agents from Alibaba and Tencent to avoid coinminer detection.

The 18 biggest data breaches of the 21st century

Security practitioners weigh in on the 18 worst data breaches in recent memory.

ransomware

What is ransomware? 4 steps to prevent these file-locking attacks

Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment. 

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

6 antivirus

Why even the best antivirus software isn't enough (and why you still need it)

Antivirus software can’t keep up with new malware or variants of known malware, but it still plays a role in an overall endpoint protection strategy.

1 intro security executive thinking woman face binary

12 things every IT security professional should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

security risk - phishing / malware / social engineering

What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders

With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.

bunch of toy robots

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet

Mirai took advantage of insecure IoT devices in a simple but clever way. It scanned big blocks of the internet for open Telnet ports, then attempted to log in default passwords. In this way, it was able to amass a botnet army.

Load More