As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattacks.
malware in pictures
Musicians dominate the 2014 list of celebs you might not want to search on for fear of malware
The Q3 Malwarebytes Labs Cybercrime Tactics and Techniques report is designed to uncover the full picture of what is going on in the cybercrime landscape, delivering a report that provides insights and statistics from July through September 2018.
A new Android malware has managed to steal access to more than 1 million Google accounts, and it continues to infect new devices, according to security firm Checkpoint.
A new open-source tool called MBRFilter can protect the master boot record of Windows computers from modification by ransomware and other malicious attacks.
Yes, even bad-guy malware developers have to keep their "customers" happy. Read what happens when F-Secure tests the "help desks" of four crypto-locking malware makers.
A newly discovered fake Pokemon Go game will actually lock your phone and then secretly run in the background, clicking on porn ads.
Has a malware infection taken your PC hostage? Here's how to clean it out and restore your PC to a pristine state.
Throughout May alone Avast Threat Labs saw the latest version of the adware on around 18,000 devices belonging to Avast users located in more than 100 countries including Russia, Italy, Germany, the UK and some users in the U.S.
While ransomware and malware can both sound pretty scary to an everyday user, it’s easy to get the two terms mixed up. Here’s a quick explanation designed to help you learn the differences and how the two relate to one another.
Advanced Persistent Threats (APTs) are the plague of enterprise security, crippling businesses and IT careers through costly data breaches and massive losses. Their goal is to steal intellectual property, and confidential company information. They ro...
Many people will know what it’s like to regularly click ‘close’ on the nagging Windows 10 ‘upgrade’ notification. It’s been happening every day for many months. But apparently something on one of these hundreds of fade-into-the-background notificatio...
Those photos of Jessica Alba may be murder on your PC. That Google search result that looks as if it answers all your questions may do nothing but create a serious tech headache. The fun you had watching that hilarious video you downloaded may not be...
Whitepapers about malware
This whitepaper discusses the results from the 2014 Cost of Data Breach Study: Australia. In this year’s report, the fifth of its kind, the total average cost paid by a company in a breach increased to $2.8 million, while assessing the likelihood of a company having data breaches in the next 24 months.
Latest News Articles
- IceGiant says its giant cooler can even tame AMD's giant Threadripper
- Google decides to 'iterate' on its deceptive favicon search plan
- The Full Nerd ep. 122: AMD's confusing Radeon RX 5600 XT launch
- Intel's Ghost Canyon NUC and Compute Element: 10 questions and intriguing facts
- Uber Elevate and Uber Air Explained
Most Popular Articles
- 1 Intel's Ghost Canyon NUC and Compute Element: 10 questions and intriguing facts
- 2 Here's what Android running on the dual-screen Surface Duo might look like
- 3 Google decides to 'iterate' on its deceptive favicon search plan
- 4 Microsoft begins bringing in developers to build its dual-screen future, including Windows 10X
- 5 Sonos extend support for legacy products after backlash
Join the newsletter!
- Google Pixel 4 XL review (2019): Full Resolution
- iPhone 11 Pro review: Identical looks, superlative cameras
- Samsung Galaxy Fold review: Show Off
- Intel Core i3 vs i5 vs i7: find out which cpu is better
- Laser vs. inkjet printers: which is better?