Menu Close

Articles on Malware

Displaying 1 - 20 of 62 articles

The Morpheus secure processor works like a puzzle that keeps changing before hackers have a chance to solve it. Alan de la Cruz via Unsplash

Shape-shifting computer chip thwarts an army of hackers

Most computer security focuses on software, but computer processors are vulnerable to hackers, too. An experimental secure processor changes its underlying structure before hackers can figure it out.
Ransomware attacks often strike local government computer systems, which poses a challenge for protecting elections. PRImageFactory/iStock via Getty Images

Ransomware can interfere with elections and fuel disinformation – basic cybersecurity precautions are key to minimizing the damage

A ransomware attack on election-related government computers in a Georgia county raises the specter of more disruptions for Election Day voting and vote tabulation.
Many of Baltimore’s city services are crippled by a cyberattack. The Conversation from City of Baltimore and Love Silhouette/Shutterstock.com

Hackers seek ransoms from Baltimore and communities across the US

Ransomware has crippled governments and companies around the world, encrypting data and demanding payment for the decryption key – though that’s no guarantee of recovering the information.
Is someone else making money on your computer? WICHAI WONGJONGJAIHAN/Shutterstock.com

Cryptojacking spreads across the web

Enterprising cryptocurrency enthusiasts have found a way to use your computer processor and electricity to make themselves money. What is cryptojacking, and how does it work?
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017. (Yun Dong-jin/Yonhap via AP)

Ransomware like Bad Rabbit is big business

Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Could scanning a QR code be an invitation to malware? Zapp2Photo/Shutterstock.com

Can you be hacked by the world around you?

Scanning physical items constructed with nefarious intent can introduce malware into a smartphone or computer.

Top contributors

More