Menu Close

Articles on Malware

Displaying 21 - 40 of 66 articles

Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017. (Yun Dong-jin/Yonhap via AP)

Ransomware like Bad Rabbit is big business

Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Could scanning a QR code be an invitation to malware? Zapp2Photo/Shutterstock.com

Can you be hacked by the world around you?

Scanning physical items constructed with nefarious intent can introduce malware into a smartphone or computer.
Taking a much closer look at what’s going on inside malware. MuchMania/Shutterstock.com

Inside the fight against malware attacks

How do malware analysts examine software that’s designed to wreak havoc with computers? By using tools that watch software’s inner workings very closely.
Not all hackers can be bad for an organisation: the white hat or ethical hacker can help. Shutterstock/napocska

An ethical hacker can help you beat a malicious one

Simply updating and patching an organisation’s computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.
The market for exploiting software vulnerabilities can be traced back to the 90s where “phreaking” - modifying telecommunications technology - was popular. Jennifer/Flickr

What the underground market for ransomware looks like

The underground market for software vulnerabilities has been growing steadily since the 1990s, so the latest WannaCry could be a sign of things to come.
Cyber attackers lurk in the shadows wielding the ability to hit governments where it hurts the most. Shutterstock

Is cyberspace the latest conflict frontier on the African continent?

Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
When calling these people, you want to be able to get through. Fairfax County, Virginia

Attackers can make it impossible to dial 911

‘Denial of service’ cyberattacks are increasingly used to shut down websites. New research reveals that 911 call centers are vulnerable to the threat as well.
Hex code from the Blaster worm reveals the potential motivations of the worm’s creator. Ward Moerman

Why save a computer virus?

How can archivists properly preserve computer programs often written specifically to destroy data?
Try to make this the only time you see a ransomware warning notice. Christiaan Colen/flickr

It’s easier to defend against ransomware than you might think

Ransomware – which encrypts your files and offers to sell you the key – operates differently from other malicious software. Those differences turn out to give potential victims a fighting chance.
Criminals who hide their computers shouldn’t go free. Computer criminal via shutterstock.com

Don’t let cybercriminals hide from the FBI

If a computer search would qualify for a warrant if its whereabouts were known, why should simply hiding its location make it legally unsearchable?

Top contributors

More