malware - News, Features, and Slideshows

Most popular

malware in pictures

News about malware
Tutorials about malware
  • Bugs & Fixes: Phony Photozoom malware adds ads

    By Ted Landau | 15 August, 2014 23:55

    Recently, upon visiting my Slanted Viewpoint blog, I was shocked to see an advertisement at the top of the page. I had never selected, modified, or added anything to my blog's settings that might have caused ads to start appearing. What the heck was going on?

  • How to recover files after a malware attack

    By Lincoln Spector | 13 January, 2014 18:25

    Malware infected Jones888's computer, and important files are no longer accessible. How can Jones get them back?

  • Answer Line: Malware or false positive?

    By Lincoln Spector | 02 January, 2013 13:48

    Davikokar launched a program even though Norton warned that it was a Trojan. A subsequent hard drive scan revealed nothing bad. Davikokar then asked the Antivirus & Security Software forum if Norton had given a false positive?

Features about malware
  • Kicking the stool out from under the cybercrime economy

    By Grant Hatchimonji | 20 August, 2014 02:54

    Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. Cripple the automated processes presented by certain malware platforms, and suddenly the threats -- and the losses --aren't quite so serious.

  • Bad bots on the rise: A look at mobile, social, porn, and spam bots.

    By David Geer | 01 May, 2014 03:41

    From 2012 to 2013, Incapsula, a website security firm focusing on CDN solutions as load balancing, found that bot traffic went from consisting of 51 percent to 61.5 percent of all Internet traffic, a 10.5-percent increase. Thirty-one percent of those bots are malicious, according to data from the report.

  • Four of the newest (and lowest) Social Engineering scams

    By Stacy Collett | 22 April, 2014 00:57

    Your computer files are being held for ransom. Pay up, or lose them. Your bank account is being emptied, so click here to stop it. Your friend has died, click on this funeral home site for more information. Social engineering thugs have reached new lows.

  • 7 sneak attacks used by today's most devious hackers

    By Roger A. Grimes | 30 December, 2013 22:32

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • Malware: War without end

    By Lamont Wood | 26 November, 2013 15:17

    Ceaselessly, with no end in sight despite outlays that amount to a tax on doing business, the decades-long struggle against malware drags on.

Whitepapers about malware

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

SECURE Web Gateway

Balancing the requirement for strong network security with the need to harness collaborative web technologies is essential for business growth.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.