10-Sec Hack Delivers First Ever Malware to Fitness Trackers
A security researcher has developed a way to exploit a vulnerability in FitBit fitness trackers and deliver malware to the target device in 10 seconds.
How To Protect Against Malware
It’s a frightening statistic — 85 percent of those who fall victim to malware and hacker attacks are unaware of their compromised state for weeks or even months at a time. As an IT dep…
Destructive malware “CryptoLocker” on the loose
There’s a destructive malware threat on the loose that calls itself “CryptoLocker.” It’s what’s known as ransomware, because that’s what it does: holds your f…
What is a Trojan? Is it a virus or is it malware?
Whether you call it Trojan malware or a Trojan virus, it’s malicious code. Here’s what you need to know.
How to Fight Malware with Hardware: Labs Notebook
Watch this animation of a researchers notebook to understand how Labs use hardware to assess threats from outside the systems that are being infected. Becaus...
How mobile malware is maturing
Mobile malware has reached a new stage of maturation, according to Juniper Networks. Top findings from Juniper's 2011 Mobile Threats Report are evidence of accelerating attacks on mobile devices: 1. There is more malware than ever before. 2011 saw a record number of mobile malware attacks -- particularly to the
Why POS Malware Still Works
New, advanced point-of-sale malware dubbed â€œPoseidonâ€ can exfiltrate card data directly from every infected device. And security experts warn that too
What is Polymorphic Malware? A Definition and Best Practices for Defending Against Polymorphic...
Learn about polymorphic malware and how to protect against this threat in Data Protection 101, our series on the fundamentals of information security.
The essential guide to anti-malware tools
Admins can choose from a bevy of secondary scanners and specialized tools to clean up infected or infested PCs.
What hackers do: their motivations and their malware
Whether a hacker uses a computer exploit or malware, their motivations are the same. Understanding why and how hackers hack is key to your defense.
What is Conficker malware and how to prevent it ?
Dispelling Myths Around SGX Malware
SGX-based malware may not be as troublesome as believed. We'll explain why that is and how Symantec is ready to deal with such malware if they were to appear.
Will Your Internet Work on Monday? How to Check for DNS Malware
A nasty piece of malware called DNSChanger will kick thousands of Mac and PC users off the Internet on Monday, and there's a chance you could be one of them. The FBI is shutting...
Top 5 Malware Trends on the Horizon
Here are 5 malware trends on the horizon that IT professionals should be on the lookout for as they impact organizations and individuals across the globe.
10+ Of The Worst Kitchen Fails Ever
Are you a disaster in the kitchen? Well, don't worry, because you're probably not as bad as you think. Check out this hilarious list of epic cooking fails to see what we mean.
Instructions published for DIY undetectable malware
How to protect yourself from malware and ransomware
The rate of malware and ransomware infections in businesses is at an all-time high and showing no signs of slowing. How you prepare can make all the diff...
10 million+ Androids have been infected by Malware
At least 10 million Android devices have been infected by malware. Here's how to protect yourself...
You Should Be Worried About Cryptocurrency Mining Malware
In the world of data security, cryptocurrency mining software is often overlooked or discounted as a threat because it doesn't do serious harm to the infected system. It bleeds off computing resources, putting them to work for the miners who...
How does Gooligan malware compromise Google accounts?
Gooligan malware can steal authentication tokens from an infected Android device to access a user's Google account. Find out how to prevent this attack.