malware in pictures
News about malware
Features about malware
The fourth quarter of 2013 was when cyber crime became a reality for more people than ever before, a McAfee report has found.
In today's network environments, malware that evades legacy defenses is pervasive, with communication and activity occurring up to once every three minutes. Unfortunately, most of this activity is inconsequential to the business. You would think that would be good news right? The problem is that incident responders have no good way of distinguishing inconsequential malware from (potentially) highly damaging malware. As a result, they spend way too much time and resources chasing red herrings while truly malicious activity slips past.
A new commercial tool designed to allow cybercriminals to easily transform legitimate Android applications into malicious software has hit the underground market, paving the way for cheap and easy development of sophisticated Android malware.
David Jevans, CTO and founder of Marble Security, recently received some bad feedback from a potential customer testing his company's product, which helps organizations manage and secure their mobile devices.
Empty-handed customers of bankrupt bitcoin exchange Mt. Gox are being targeted in a ploy likely intended to distributed malware.
A new variant of the Gameover malware that steals online banking credentials comes with a kernel-level rootkit that makes it significantly harder to remove, according to security researchers from Sophos.
Malware activity has become so pervasive globally that attack servers communicating with Malware are now hosted in 206 countries and territories.
The number of attacks exploiting a yet-to-be-patched vulnerability in Internet Explorer has increased dramatically over the past few days, indicating the exploit is no longer used just in targeted attacks against particular groups of people.
Most ReadGet exclusive access to ARN's news, research and invitation only events.
Ceaselessly, with no end in sight despite outlays that amount to a tax on doing business, the decades-long struggle against malware drags on.
A router is the heart of your network, so it deserves to be chosen carefully. Any router will share your Internet connection amongst your computers and other networkable devices (smartphones, tablets, and so on), but better models provide features that will enhance your network and its performance. Whether you're seeking a business- or consumer-class router, here are the eight most essential features to look for.
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them
Mobile malware is getting lots of attention these days, but you can’t forget about your PC’s security— after all, you probably still use it to pay bills, shop online, and store sensitive documents.
Malware targeting Android-powered mobile devices and Apple computers top a list scams and security threats the people need to guard against this holiday shopping season.
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
Sign up now »Featured Resources
ABT Online, an IBM® Business Partner, needed to refresh its ageing multi-platform managed services infrastructure to support existing enterprise clients and to serve new small to medium business customers.Most Commented
iAsset is a channel management ecosystem that automates all major aspects of the entire sales,marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.CSOComputerworldCIOTechworldCMO
- RadiumOne brings programmatic advertising tech platform to Australia
- Aussie online tailor adopts 3D body scanner to improve omni-channel strategy
- At Cebit opening ceremony, leaders evoke need to protect private data
- Women's rights campaigns to take over social discovery app Tinder
- Telling the right story: Best Western's customer experience journey
- Commissioner finds Telstra breached privacy of 15,775 customers
- EXCLUSIVE: WhiteGold plugs datacentre gap with A10 Networks partnership
- Chorus moves to address $1 billlion funding gap
- Three times as much malware in 2013: McAfee
- More News
- 13 Mar
- JuiceIT 2014
- 18 Mar
- Webinar: Your key to unlocking sustainable profits
- 19 Mar
- WEBINAR: Cloud Computing 2014 - Why it can be a real competitive advantage for s...
- 20 Mar
- Navigating Analytics
- View all events