Most popular

malware in pictures

News about malware
Tutorials about malware
Features about malware
  • Four of the newest (and lowest) Social Engineering scams

    By Stacy Collett | 22 April, 2014 00:57

    Your computer files are being held for ransom. Pay up, or lose them. Your bank account is being emptied, so click here to stop it. Your friend has died, click on this funeral home site for more information. Social engineering thugs have reached new lows.

  • 7 sneak attacks used by today's most devious hackers

    By Roger A. Grimes | 30 December, 2013 22:32

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • Malware: War without end

    By Lamont Wood | 26 November, 2013 15:17

    Ceaselessly, with no end in sight despite outlays that amount to a tax on doing business, the decades-long struggle against malware drags on.

  • 7 sneak attacks used by today's most devious hackers

    By Roger A. Grimes | 30 September, 2013 10:05

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • 8 essential features you need in a business router

    By Eric Geier | 17 May, 2013 15:56

    A router is the heart of your network, so it deserves to be chosen carefully. Any router will share your Internet connection amongst your computers and other networkable devices (smartphones, tablets, and so on), but better models provide features that will enhance your network and its performance. Whether you're seeking a business- or consumer-class router, here are the eight most essential features to look for.

Whitepapers about malware

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

ZENworks® Endpoint Security Management

Protect against bugs in USB Storage devices

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.