Malware

Malware news, analysis, research, how-to, opinion, and video.

google verify apps
Mac malware Apple

plastic soldiers

Report: Attacks based on open source vulnerabilities will rise 20 percent this year

As open source code becomes more prevalent in both commercial and home-grown applications, the number of attacks based on its vulnerabilities will increase by 20 percent this year, predicted Black Duck Software, which collects...

03 shipping malware

Why Linux users should worry about malware and what they can do about it

From updates, to VPNs, to firewalls and AV, there are several steps Linux users should take to stay safe.

security code big data cyberespionage byte

After MongoDB, ransomware groups hit exposed Elasticsearch clusters

After deleting data from thousands of publicly accessible MongoDB databases, ransomware groups have started doing the same with Elasticsearch clusters that are accessible from the Internet and are not properly secured.

hacker, hack, hacking

Siblings arrested in Italy's worst cyberespionage operation ever

The Tuesday arrest of Giulio Occhionero and his sister, Francesca Maria, has brought to light what appears to be the biggest, and highest-profile, hacking of institutional and corporate accounts ever reported in Italy.

Digital Key encryption

Professionally designed ransomware Spora might be the next big thing

Security researchers have found a new very well designed ransomware program dubbed Spora that can perform strong offline file encryption and brings several innovations to the ransom payments model.

code hacker cyberespionage eye data

Disk-wiping malware Shamoon targets virtual desktop infrastructure

A cyber sabotage program that wiped data from 30,000 computers at Saudi Arabia's national oil company in 2012 has now returned and is able to target server-hosted virtual desktops.

security code big data cyberespionage byte

More than 10,000 exposed MongoDB databases deleted by ransomware groups

Groups of attackers have adopted a new tactic that involves deleting publicly exposed MongoDB databases and asking for money to restore them.

ransomware hardware security embedded circuit board integrated controller

KillDisk cyber sabotage tool evolves into ransomware

A malicious program called KillDisk that has been used in the past to wipe data from computers during cyberespionage attacks is now encrypting files and asking for an unusually large ransom.

ransomware locked computer stock image cropped

Ransomware took in $1 billion in 2016--improved defenses may not be enough to stem the tide

Increased user awareness of phishing threats, better antivirus technology, more industry-wide information sharing and cross-border efforts by law enforcement authorities will combine to turn the tide against ransomware this year,...

lg 50ga6400 smart tv google android

Ransomware on smart TVs is here and removing it can be a pain

Over the Christmas a user reported the first in-the-wild case of a ransomware attack that infected an Android-based smart TV.

man with online security key

5 signs we're finally getting our act together on security

Despite all the bad news in information security in 2016, some positive developments may finally shift momentum

security code big data cyberespionage byte

The group that hacked the DNC infiltrated Ukrainian artillery units

The cyberespionage group blamed for hacking into the U.S. Democratic National Committee (DNC) has also infiltrated the Ukrainian military through a trojanized Android application used by artillery units.

healthcare data breach ts

How a dose of AI could be the cure for hospital EHR cyberattacks in 2017

We are all sick (literally) and tired of the endless rounds of 'catch the data thief' playing at a hospital near you. Since these hospital attacks begin in 2014, they seem to get worse each year. Now industry pundits are indicating...

20160225 stock mwc ericsson booth security locks

The year ransomware became one of the top threats to enterprises

Ransomware creators are increasingly targeting companies and other organizations, sometimes using techniques borrowed from cyberespionage attacks, because they're likely to pay more money for their data.

encryption security Android

Mobile banking trojans adopt ransomware features

Cybercriminals are adding file-encrypting features to traditional mobile banking trojans, creating hybrid threats that steal sensitive information and lock user files at the same time.

ransomware at your service 1

Ransomware: at your service

Find out what Ransomware as a service looks like and how to protect your network from it. Now it is even easier for amateur criminals to get the malware all packaged up for them.

20160225 stock mwc ericsson booth security locks

Ransomware fighting coalition adds new members and decryption tools

The No More Ransom project, a coalition of law enforcement and security companies, has expanded with 30 new members and added 32 new decryption tools for various ransomware variants.

20160225 stock mwc ericsson booth security locks

Ransomware attacks against businesses increased threefold in 2016

The number of ransomware attacks targeting companies increased threefold from January to September, affecting one in every five businesses worldwide.

Load More