Malware

Malware news, analysis, research, how-to, opinion, and video.

Malware credit card hacking ecommerce

Cybercrime group abuses Windows app compatibility feature

The FIN7 cybercrime group is abusing the Windows Application Compatibility Infrastructure, a feature that makes it possible for enterprises and developers to quickly resolve incompatibilities between their applications and new Windows...

img 20170426 133354 01

Ransomware attacks are taking a bigger toll on victims' wallets

Hackers spreading ransomware are getting greedier. In 2016, the average ransom demand to free computers hit with the notorious infection rose to $,1077, up from $294 the year before, according to cybersecurity firm Symantec.

8 small business security

How your company needs to train workers in cybersecurity

Businesses are being urged to train their workers to be more vigilant than ever to protect passwords and sensitive data and to recognize threats.

hacking connected car

Researchers remotely kill the engine of a moving car by hacking vulnerable car dongle

Researchers exploited vulnerabilities in Bosch Drivelog Connect to remotely kill the engine of a moving car.

hacking cybercrime cybersecurity internet coding programming code

There's now a tool to test for NSA spyware

Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.

Mac malware Apple

Hackers use old Stuxnet-related bug to carry out attacks

Users that run unpatched software beware. Hackers have been relying on an old software bug connected to the Stuxnet worm to carry out their attacks.

cyberattack

DHS's ICS-CERT warns of BrickerBot: IoT malware that will brick vulnerable devices

ICS-CERT again warned to beware of BrickerBot, an IoT malware which will brick vulnerable devices.

windows 10 hidden revealed

Fact or fiction? The truth about the Windows and Office hacks

In the last week, media reports suggested that Office and Windows users were at extreme risk of being hacked. Then the facts started coming in

Hacked, unlocked, unsafe.

1,175 hotels listed in payment card breach of Holiday Inn parent company

InterContinental Hotels Group reported 1,175 IHG-branded hotels were involved in a payment card breach; the investigation is not complete, but so far 1,174 franchise hotels in the US are known to have had malware accessing payment...

frustrated computer user

New ransomware demanded high score on anime-style shooter game not bitcoins

No bitcoins? No problem for victims of Rensenware...just reach an astronomically high score in lunatic difficulty mode and encrypted files would be automatically decrypted.

hacking cybercrime cybersecurity internet coding programming code

Email-based attacks exploit unpatched vulnerability in Microsoft Word

Attackers for the past few months have been exploiting an unpatched vulnerability in Microsoft Word to compromise computers and infect them with malware.

Windows security holes

Word zero-day affects all versions of Office and Windows

Some say McAfee violated 'responsible disclosure' norms when it rushed to disclose the exploit ahead of Microsoft's fix

21394517746 9a77570fae o

WikiLeaks: CIA used bits of Carberp Trojan code for malware deployment

When the source code to suspected Russian-made malware leaked online in 2013, guess who used it? A new release from WikiLeaks claims the CIA borrowed some of the code to bolster its own hacking operations.

security code big data cyberespionage byte

IoT malware begins to show destructive behavior

Hackers have started adding data-wiping routines to malware that's designed to infect internet-of-things and other embedded devices.

Digital Key encryption

A free decryption tool is now available for all Bart ransomware versions

Antivirus vendor Bitdefender has released a free decryption tool that works for any files affected by the Bart ransomware.

Android Google marshmallow

Notorious iOS spyware, Pegasus, has an Android sibling

Security researchers have uncovered the Android version of an iOS spyware known as Pegasus in a case that shows how targeted electronic surveillance can be.

freefromransomware primary
Update

How to rescue your PC from ransomware

Ransomware is a serious headache. Don't negotiate with e-terrorists. Be a hero and rescue your hostage PC.

Security

UEFI flaws can be exploited to install highly persistent ransomware

A team of researchers from security vendor Cylance demonstrated a proof-of-concept ransomware program that ran inside a motherboard's Unified Extensible Firmware Interface (UEFI).

21394517746 9a77570fae o

Latest WikiLeaks dump exposes CIA methods to mask malware

WikiLeaks may have dealt another blow to the CIA’s hacking operations by releasing files that allegedly show how the agency was masking its malware attacks.

code programming software bugs cybersecurity

Open-source developers targeted in sophisticated malware attack

Developers who publish their code on GitHub have been targeted in an attack campaign that uses a little known but potent cyberespionage malware.

Load More