New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Malware, virus, Trojan and spyware protection and removal News
April 17, 2018
A variant of the Mirai IoT botnet is the suspected cause of distributed denial-of-service attacks on financial services companies earlier this year, according to Recorded Future.
February 16, 2018
News roundup: The Olympic Destroyer malware is more sophisticated than researchers first thought. Plus, Microsoft looks to change identity management with blockchain, and more.
February 01, 2018
Nearly 140 samples of malware that exploit the Meltdown and Spectre vulnerabilities have been discovered by AV-TEST, but most samples are based on existing proof-of-concept code.
January 31, 2018
IT departments deploy a range of data restore approaches to mitigate the risk of a debilitating ransomware attack. Time is of the essence, however.
Malware, virus, Trojan and spyware protection and removal Get Started
Bring yourself up to speed with our introductory content
It seemed that no IoT device was safe from the Mirai botnet when it took down major enterprises and internet infrastructure providers with massive DDoS attacks. Continue Reading
SMBs are especially at risk of cyberattacks. Follow these steps, and even with a limited budget and staff, you could successfully recover from ransomware. Continue Reading
In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious. Continue Reading
Evaluate Malware, virus, Trojan and spyware protection and removal Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Ransomware attacks on enterprises are often the result of a company's poor IT hygiene. Expert Joe Granneman looks at attacks like those by WannaCry and SamSam ransomware. Continue Reading
When it comes to fighting and protecting against ransomware, there are some major features of virtual disaster recovery that top physical environments. Continue Reading
Mobile device management can be a crucial part of enterprise security. Expert Matt Pascucci presents the key questions to ask when investigating MDM products. Continue Reading
Manage Malware, virus, Trojan and spyware protection and removal
Learn to apply best practices and optimize your operations.
A watering hole attack led to CCleaner malware being installed on millions of systems. Nick Lewis explains how the attack worked and why it should concern enterprises. Continue Reading
Trisis malware targets safety instrumented systems and puts industrial control systems at risk. Expert Ernie Hayden reviews what to know about SIS and its security measures. Continue Reading
Effectively tackling email security issues requires infosec pros to address a broad range of areas, including cloud, endpoints, user training and more. Continue Reading
Problem Solve Malware, virus, Trojan and spyware protection and removal Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
An increase in fileless malware, including PowerShell malware, was reported in McAfee Labs' December 2017 Threat Report. Discover how enterprises can defend again fileless attacks. Continue Reading
Researchers developed aIR-Jumper, an exploit that leverages lights within security cameras to extract data. Learn how this attack works and how to prevent it with expert Nick Lewis. Continue Reading
Poisoned search results have spread the Zeus Panda banking Trojan throughout Google. Learn what this means, how search engine poisoning works and what can be done to stop it. Continue Reading