Malware

Malware news, analysis, research, how-to, opinion, and video.

img 20170426 133354 01
8 small business security

hacking cybercrime cybersecurity internet coding programming code

There's now a tool to test for NSA spyware

Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.

Forget signatures for malware detection. SparkCognition says AI is 99% effective  

The volume of malicious software in the wild has exceeded researchers’ ability to write signatures for all of it. The most effective way to detect malware today is through the use of artificial intelligence

Mac malware Apple

Hackers use old Stuxnet-related bug to carry out attacks

Users that run unpatched software beware. Hackers have been relying on an old software bug connected to the Stuxnet worm to carry out their attacks.

security code big data cyberespionage DDoS

A vigilante hacker may have built a computer worm to protect the IoT

Is a vigilante hacker trying to secure your IoT device from malware? The mysterious developer behind a growing computer worm wants people to think so.

karm

At $175, this ransomware service is a boon to cybercriminals

Cybercriminals can engage in more ransomware attacks, thanks to a new variant called Karmen that hackers can buy on the black market for $175.

botnet bots

IoT malware clashes in a botnet territory battle

Mirai -- a notorious malware that’s been enslaving IoT devices -- has competition. A rival piece of programming has been infecting some of the same easy-to-hack products, with a resiliency that surpasses Mirai, according to security...

dragon statue head

Can AI and ML slay the healthcare ransomware dragon?

Healthcare is well known as “low-hanging fruit” for ransomware attacks. But according to some experts, artificial intelligence and machine learning, as part of a “layered” security program, can make them a much more difficult target.

malware payment terminal credit card

Dridex gang uses unpatched Microsoft Word exploit to target millions

The gang behind the Dridex computer trojan has adopted an unpatched Microsoft Word exploit used in attacks for months and used it to target millions of users.

botnet bots

US dismantles Kelihos botnet after Russian hacker's arrest

The arrest last week of a Russian man in Spain was apparently for his role in a massive spam botnet and not related to an ongoing investigation into foreign tampering with last year's U.S. election.

code hacker cyberespionage eye data

Latest Shadow Brokers exploit dump poses little threat

None of the new alleged NSA exploits leaked by the Shadow Brokers hacking group poses an immediate threat to users.

hacking cybercrime cybersecurity internet coding programming code

Email-based attacks exploit unpatched vulnerability in Microsoft Word

Attackers have been exploiting an unpatched vulnerability in Microsoft Word for the past few months to compromise computers and infect them with malware.

21394517746 9a77570fae o

WikiLeaks: CIA used bits of Carberp Trojan code for malware deployment

When the source code to suspected Russian-made malware leaked online in 2013, guess who used it? A new release from WikiLeaks claims the CIA borrowed some of the code to bolster its own hacking operations.

security code big data cyberespionage byte

IoT malware starts showing destructive behavior

Hackers have started adding data-wiping routines to malware that's designed to infect internet-of-things and other embedded devices.

Mac malware Apple

McAfee: Trend indicates 2017 will be bumper year for new malware

A cycle of increasing new malware is well underway and could last the rest of this year if a trend established over the past two years continues.

security code big data cyberespionage DDoS

Apache Struts 2 exploit used to install ransomware on servers

Attackers are exploiting a vulnerability patched last month in the Apache Struts web development framework to install ransomware on servers.

Digital Key encryption

A free decryption tool is now available for all Bart ransomware versions

Antivirus vendor Bitdefender has released a free decryption tool that works for any files affected by the Bart ransomware.

Android Google marshmallow

Notorious iOS spyware has an Android sibling

Security researchers have uncovered the Android version of an iOS spyware known as Pegasus in a case that shows how targeted electronic surveillance can be.

freefromransomware primary
Update

How to rescue your PC from ransomware

Ransomware is a serious headache. Don't negotiate with e-terrorists. Be a hero and rescue your hostage PC.

Load More