BRATA malware disguises itself as security tools on Google Play
The Google Play Store application as shown on a smartphone display
malware

BRATA malware disguises itself as security tools on Google Play

Hackers are tricking victims into granting their malicious apps certain permissions before taking control of Android devices
13 Apr 2021
Best ransomware removal tools
A ransomware splash screen displayed on a laptop in an office
ransomware

Best ransomware removal tools

The top free and paid toolkits available right now to protect you from hackers
9 Apr 2021
Gigaset devices laced with malware after third-party server hack
Malware on an Android smartphone
malware

Gigaset devices laced with malware after third-party server hack

Several Android smartphones have been pre-packaged with malicious apps as part of a supply chain attack
9 Apr 2021
Weekly threat roundup: Fortinet, Apple Mail, AMD Zen 3 CPUs
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: Fortinet, Apple Mail, AMD Zen 3 CPUs

Pulling together the most dangerous and pressing flaws that businesses need to patch
8 Apr 2021
Wormable Android malware is spreading through WhatsApp messages
Malware on a phone
malware

Wormable Android malware is spreading through WhatsApp messages

Researchers found the malware hidden in an app pretending to be Netflix on the Google Play store
7 Apr 2021
Hackers target LinkedIn users with fake job offers to spread malware
A user accessing LinkedIn on their mobile phone device
malware

Hackers target LinkedIn users with fake job offers to spread malware

The Golden Chicken group is selling the More_Eggs backdoor to other groups as a malware as a service (MaaS) model
6 Apr 2021
Android spyware disguised as 'system update' app discovered
The update notification on an Android device
malware

Android spyware disguised as 'system update' app discovered

This malware strain steals private messaging and location data while also recording phone calls
29 Mar 2021
What is NotPetya?
Graphic showing the NotPetya logo on a laptop
ransomware

What is NotPetya?

We take a look at the malware that first came to prominence in 2016 and targets Windows-based machines
26 Mar 2021
How computer viruses spread and how to avoid them
computer virus
malware

How computer viruses spread and how to avoid them

You know that computer viruses can be a nightmare; here's how they spread from one computer to the next
26 Mar 2021
Weekly threat roundup: Android, Windows, Purple Fox
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: Android, Windows, Purple Fox

Pulling together the most dangerous and pressing flaws that businesses need to patch
25 Mar 2021
Purple Fox malware can now spread between Windows devices
An origami purple fox on a wooden surface
malware

Purple Fox malware can now spread between Windows devices

The rootkit has added self-propagating capabilities to its arsenal with roughly 100,000 machines already infected
24 Mar 2021
CopperStealer malware hijacks Facebook business accounts to run malicious ads
A Facebook business page with notifications
malware

CopperStealer malware hijacks Facebook business accounts to run malicious ads

The disruption of the campaign was part of coordinated action from Facebook, Cloudflare, and other providers
19 Mar 2021
Hackers target US taxpayers with NetWire and Remcos malware
Malware in code
malware

Hackers target US taxpayers with NetWire and Remcos malware

Attackers are attempting to lure victims with malware-laced Word documents that purport to contain tax-related content
19 Mar 2021
New Mirai variant spotted targeting network devices
Image of small robots connected to represent a botnet
malware

New Mirai variant spotted targeting network devices

Palo Alto researchers claim exploit code for ten vulnerabilities have been used so far
17 Mar 2021
Hackers spoofed Huawei website to steal 5G information
Huawei website homepage, with Huawei logo visible on display screen
phishing

Hackers spoofed Huawei website to steal 5G information

McAfee uncovers phishing campaign that may have been motivated by the ban of Chinese technology in the global 5G rollout
16 Mar 2021
Chinese hackers target Linux systems with RedXOR backdoor
A hacker wearing glasses in a dark room with the Chinese flag shown in the background on a computer display
malware

Chinese hackers target Linux systems with RedXOR backdoor

Linux servers hit by malware developed using an end-of-life Red Hat compiler
11 Mar 2021
Invoice ZLoader campaign hides within encrypted Excel docs
Malware in code
malware

Invoice ZLoader campaign hides within encrypted Excel docs

Emails use fake new IRS taxation rules to lure victims
8 Mar 2021
The top 12 password-cracking techniques used by hackers
A list of poorly-constructed passwords on a notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective, methods for stealing passwords
3 Mar 2021
What is a Trojan?
Toy horse on a digital screen to symbolise the attack of the Trojan virus
Security

What is a Trojan?

The malicious malware lurks behind legitimate software to invade your computer
25 Feb 2021
Mysterious Silver Sparrow malware hits 30,000 macOS devices
A close-up shot of a MacBook keyboard
malware

Mysterious Silver Sparrow malware hits 30,000 macOS devices

The cluster is among the first to spread malware affecting devices fitted with Apple’s new M1 chip
22 Feb 2021
MacBook users warned against EvilQuest ransomware
Red skull and crossbones atop binary code
ransomware

MacBook users warned against EvilQuest ransomware

The malware aims to encrypt macOS devices, which are typically less affected by ransomware
19 Feb 2021
'BendyBear' APT malware linked to Chinese government hackers
Malware in code
malware

'BendyBear' APT malware linked to Chinese government hackers

Security researchers warn that the malware’s anti-analysis techniques make it exceptionally difficult to detect
9 Feb 2021
UK military used malware to disrupt extremist networks
Military operative on a remote computer
malware

UK military used malware to disrupt extremist networks

Experts cite WannaCry with warnings that hacking tools have the potential for severe collateral damage
8 Feb 2021