New & Notable
Malware, virus, Trojan and spyware protection and removal News
February 05, 2020
New Cisco Talos research shows an increase in ransomware attacks that double the pressure on victims by threatening them with the exposure of their sensitive data.
January 28, 2020
Three alleged cybercriminals suspected of being associated with Magecart were arrested in Indonesia via an Interpol-assisted operation called Operation Night Fury.
January 07, 2020
Threat actors appear to be exploiting vulnerable Pulse Secure VPN servers to hit enterprises with ransomware attacks, even though a patch has been available since April 2019.
December 18, 2019
A debate has erupted between the insurance industry and the infosec community over whether cyberinsurance payouts have led to the surge in ransomware attacks this year.
Malware, virus, Trojan and spyware protection and removal Get Started
Bring yourself up to speed with our introductory content
A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard. Continue Reading
Virus detection techniques used by antimalware tools can be a huge boost to enterprise cybersecurity programs. Learn how antimalware software works and its benefits in this tip. Continue Reading
Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge. Continue Reading
Evaluate Malware, virus, Trojan and spyware protection and removal Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Ransomware is a subset of malware in which the data on a victim's computer is locked -- typically by encryption -- and payment is demanded before the ransomed data is decrypted and access is returned to the victim. Continue Reading
A zero-day vulnerability isn't the same as a zero-day exploit. Learn the difference between these two zero-day terms, as well as why they should be high priority on any CISO's patching list. Continue Reading
While backup and recovery products are important, organizations should be looking to go steps further to stay safe in the face of cyberthreats. A Unitrends GM provides details. Continue Reading
Manage Malware, virus, Trojan and spyware protection and removal
Learn to apply best practices and optimize your operations.
Shellcode is a set of instructions that executes a command in software to take control of or exploit a compromised machine. Read up on the malware term and how to mitigate the risk. Continue Reading
MSP software vendor ConnectWise's annual IT Nation Connect event revealed the pressures managed service providers are under to transition to advanced cybersecurity. Continue Reading
AI applications in security offers organizations four unique benefits. Learn how machine learning advances can change industry approaches to threat detection and prevention. Continue Reading
Problem Solve Malware, virus, Trojan and spyware protection and removal Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Hackers are taking deception to a new level, but security awareness programs are instrumental in helping employees detect various types of cyberfraud. Continue Reading
Learn how social networking sites compound the insider threat risk, and explore how to mitigate the threat with policy, training and technology. Continue Reading
More than three years after its first appearance, the Mirai botnet is still one of the biggest threats to IoT. Learn about its variants and how to protect against them. Continue Reading