malware

Best ransomware removal tools
A ransomware splash screen displayed on a laptop in an office
ransomware

Best ransomware removal tools

The top free and paid toolkits available right now to protect you from hackers
14 Oct 2021
FontOnLake: "Sophisticated" malware targets Linux systems
Malware in code
malware

FontOnLake: "Sophisticated" malware targets Linux systems

The malware stands out for its ability to maintain persistence on the infected system
11 Oct 2021
What is NotPetya?
Graphic showing the NotPetya logo on a laptop
ransomware

What is NotPetya?

We take a look at the malware that first came to prominence in 2016 and targets Windows-based machines
8 Oct 2021
Best free malware removal tools 2021
Malware spotted in red code on black background
Security

Best free malware removal tools 2021

Worried your device is infected? Here are the tools you need to get rid of malicious software
8 Oct 2021
Maverick fast-attack ransomware group FIN12 is quickly expanding
Ransomware message on a computer screen
ransomware

Maverick fast-attack ransomware group FIN12 is quickly expanding

FIN12 hits hospitals even during pandemic
7 Oct 2021
Senator to introduce new bill to force ransomware payment disclosures
The senate floor during a vote
ransomware

Senator to introduce new bill to force ransomware payment disclosures

Organizations would have 48 hours to inform DHS
6 Oct 2021
What is hacktivism?
Two masked members of Anonymous demonstrating during the Occupy protest on October 15, 2011 in The Hague
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
1 Oct 2021
How to reduce the risk of phishing and ransomware
Large letter 'O' against a background of a city - whitepaper from Mimecastwhitepaper
Whitepaper

How to reduce the risk of phishing and ransomware

Top security concerns and tips for mitigation
1 Oct 2021
The state of brand protection 2021
A log-in screen with a red background - whitepaper from Mimecastwhitepaper
Whitepaper

The state of brand protection 2021

A new front opens up in the war for brand safety
1 Oct 2021
Malware pretending to be Amnesty International antivirus for Pegasus discovered
Amnesty International website
malware

Malware pretending to be Amnesty International antivirus for Pegasus discovered

Victims fearing Pegasus spyware targeted in a new malware campaign
1 Oct 2021
How to turn on Windows Defender
Windows 10 Defender
Software

How to turn on Windows Defender

Find out how to turn on, or off, Windows Defender on Windows 10 and older versions of Windows
30 Sep 2021
Malware developers create malformed code signatures to avoid detection
Malware in code
malware

Malware developers create malformed code signatures to avoid detection

Google researchers uncovers technique used to push dodgy software onto unsuspecting victims
24 Sep 2021
HP Wolf Security: Threat insights report
Skyscrapers from belowwhitepaper
Whitepaper

HP Wolf Security: Threat insights report

Equipping security teams with the knowledge to combat emerging threats
24 Sep 2021
What's the difference between antimalware and antivirus?
Click here for malware
malware

What's the difference between antimalware and antivirus?

We help you navigate the worlds of antimalware and antivirus
17 Sep 2021
IoT privacy and security concerns
A secure network depicted by connected padlocks
Security

IoT privacy and security concerns

We take a look at what's needed to really secure internet-connected devices
15 Sep 2021
Hackers develop Linux port of Cobalt Strike for new attacks
Malware represented by red and blue digital binary code
Security

Hackers develop Linux port of Cobalt Strike for new attacks

The modified version of the penetration testing toolkit can evade malware detection
14 Sep 2021
Ragnar Locker vows to leak data if victim contacts the police
Visual representation of ransomware by showing encrypted files on a display
ransomware

Ragnar Locker vows to leak data if victim contacts the police

The ransomware gang said victims hiring "professional negotiators" are making the recovery process worse
7 Sep 2021
The top 12 password-cracking techniques used by hackers
A list of poorly-constructed passwords on a notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective methods for stealing passwords
7 Sep 2021
Hackers use WebSVN to deploy new Mirai malware
Malware in code
malware

Hackers use WebSVN to deploy new Mirai malware

Attackers used the notorious malware to perform distributed denial of service attacks
31 Aug 2021
Fin8 returns with Badhatch backdoor targeting US organizations
Malware in code
malware

Fin8 returns with Badhatch backdoor targeting US organizations

The backdoor evades security with TLS encrypted PowerShell commands
30 Aug 2021
What is a Trojan?
Toy horse on a digital screen to symbolise the attack of the Trojan virus
Security

What is a Trojan?

The malicious malware lurks behind legitimate software to invade your computer
27 Aug 2021
Widely-used WhatsApp mod stuffed with malware
Malware spotted in red code on black background
malware

Widely-used WhatsApp mod stuffed with malware

FMWhatsApp is embedded with the Triada Trojan which tracks device information and intercepts texts
25 Aug 2021
Bahrain targets activists with NSO's Pegasus spyware
Computer code on a screen with a skull representing a computer virus / malware attack.
spyware

Bahrain targets activists with NSO's Pegasus spyware

The spyware reportedly employed two exploits targeting Apple's iMessage system
24 Aug 2021