New & Notable
Malware, Viruses, Trojans and Spyware News
July 24, 2014
Preview: At Black Hat USA, experts will detail the steps taken by the security community and law enforcement to put down the infamous CryptoLocker ransomware.
June 12, 2014
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
June 10, 2014
CryptoLocker's infrastructure may be down for now, but experts say the easy money that can be made from ransomware means it is here to stay.
May 13, 2014
Security flaws in protocols such as NTLM are so easy to exploit that in many cases attackers no longer need the latest and greatest malware.
Malware, Viruses, Trojans and Spyware Get Started
Bring yourself up to speed with our introductory content
An equipment destruction attack, also known as a hardware destruction attack, is an exploit that destroys physical computer and electronic equipment. Equipment destruction attacks can be enabled simply as a result of physical access to the computer... Continue Reading
A domain generation algorithm or DGA is a computer program used to create domain names, typically for the purpose of propagating remotely controlled Web-based malware. Continue Reading
Pre-installed malware is malicious software that is put on a machine before it is delivered to the user. New devices are usually assumed to be uncompromised but there are numerous reports of malware existing on new hardware. Continue Reading
Evaluate Malware, Viruses, Trojans and Spyware Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Developing an enterprise mobile security strategy is a challenge. Nick Lewis offers his insight on the viability of mobile antimalware protection. Continue Reading
The CryptoLocker ransomware caught many enterprises off guard. Expert Nick Lewis explains why it's unique and the one defense strategy that works. Continue Reading
Increasingly sophisticated malware can divert the attention of IT departments from low-level security gaps. Here’s why you need a strategy that works on all levels. Continue Reading
Manage Malware, Viruses, Trojans and Spyware
Learn to apply best practices and optimize your operations.
The amount of malware using peer-to-peer communications has increased dramatically. Enterprise threats expert Nick Lewis explains how to detect P2P malware. Continue Reading
Cloaked malware, like DGA.Changer, can reportedly evade sandbox detection. Nick Lewis explains how to handle the risk. Continue Reading
An updated, 64-bit version of the Zeus malware leverages Tor for C&C. What does this mean for enterprises? Nick Lewis discusses. Continue Reading
Problem Solve Malware, Viruses, Trojans and Spyware Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The Fokirtor Trojan creates a dangerous backdoor in Linux systems. Learn how to keep enterprise Linux systems from being infiltrated and compromised. Continue Reading
Learn about the growing risk of madware in mobile applications, as well as what enterprises should do to prevent security issues. Continue Reading
A strain of malware can steal data from a USB device itself rather than infect a network or system. Nick Lewis explains how to mitigate the threat. Continue Reading