Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

Attacks surged from just 5,000 during the first three quarters of 2019 to 67 million in 2020 so far
29 Oct 2020
Sopra Steria confirms it was hit by new Ryuk ransomware variant
Computer virus transfer into a desktop PC by internet LAN line
Security

Sopra Steria confirms it was hit by new Ryuk ransomware variant

The French IT services firm has admitted it will take "weeks" for business operations to return to normal
26 Oct 2020
Microsoft spearheads industry-wide charter against AI cyber attacks
Security

Microsoft spearheads industry-wide charter against AI cyber attacks

Security professionals can rely on the framework to fight cyber attacks targeting corporate machine learning systems
23 Oct 2020
Weekly threat roundup: Chrome, Citrix and WordPress
Graphic of a red insecure padlock among blue secure padlocks
Security

Weekly threat roundup: Chrome, Citrix and WordPress

Pulling together the most dangerous and pressing flaws that businesses need to patch
23 Oct 2020
US charges six Russians behind NotPetya and Olympics hacks
Security

US charges six Russians behind NotPetya and Olympics hacks

The GRU members spread some of the most infamous malware strains including NotPetya and Olympic Destroyer
20 Oct 2020
Microsoft becomes the most-spoofed brand for phishing attacks
Security

Microsoft becomes the most-spoofed brand for phishing attacks

The tech giant was imitated in almost 20% of all phishing attacks during the third quarter
20 Oct 2020
Bank-targeting malware disguises itself as video conferencing software
Security

Bank-targeting malware disguises itself as video conferencing software

IBM says the Vizom malware is spreading through spam-based phishing campaigns
19 Oct 2020
Weekly threat roundup: Windows 10, Adobe, and SonicWall VPNs
Graphic depicting blue locked padlocks and one red unlocked padlock
Security

Weekly threat roundup: Windows 10, Adobe, and SonicWall VPNs

The most dangerous and pressing cyber security exploits from the week gone by
16 Oct 2020
What is a Trojan?
Trojan virus
Security

What is a Trojan?

The malicious malware lurks behind legitimate software to invade your computer
14 Oct 2020
What is hacktivism?
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
13 Oct 2020
Microsoft disrupts infamous Trickbot botnet ahead of US election
ransomware

Microsoft disrupts infamous Trickbot botnet ahead of US election

Trickbot primarily targets financial institutions, but it could impact the election too
12 Oct 2020
What is WannaCry?
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
12 Oct 2020
Weekly threat roundup: Apple, AMD, and Google
Graphic depicting blue locked padlocks and one red unlocked padlock
Security

Weekly threat roundup: Apple, AMD, and Google

The most dangerous and pressing cyber security exploits from the week gone by
9 Oct 2020
The top 12 password-cracking techniques used by hackers
list of poor passwords on notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective, methods for stealing passwords
5 Oct 2020
The top 12 password-cracking techniques used by hackers
list of poor passwords on notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective, methods for stealing passwords
5 Oct 2020
IoT botnet exploiting two zero-day flaws in Tenda routers
Botnet graphic
Security

IoT botnet exploiting two zero-day flaws in Tenda routers

The Ttint botnet is based heavily on the Mirai malware and includes 12 protocols for remote access
5 Oct 2020
How computer viruses spread and how to avoid them
malware

How computer viruses spread and how to avoid them

You know that computer viruses can be a nightmare; here's how they spread from one computer to the next
1 Oct 2020
IoT privacy and security concerns
Security

IoT privacy and security concerns

We take a look at what's needed to really secure internet-connected devices
29 Sep 2020
US hospitals forced offline by reported Ryuk ransomware attack
A forlorn doctor in a facemask, looking out the window
ransomware

US hospitals forced offline by reported Ryuk ransomware attack

Universal Health Services employees have been told IT issues could go on for days
29 Sep 2020
Google removes 17 apps infected with evasive ‘Joker’ malware
The Google Play Store application as shown on a smartphone display
malware

Google removes 17 apps infected with evasive ‘Joker’ malware

Researchers identify three variations in the way the 'fleeceware' strain infects victims' Android devices
28 Sep 2020
How to install Kali Linux on Raspberry Pi
Security

How to install Kali Linux on Raspberry Pi

Follow these simple steps to install the penetration testing software on the compact computer for mobile hacking
22 Sep 2020
Ransomwiz lets you test your security with simulated ransomware
Ransomwiz logo on black background
ransomware

Ransomwiz lets you test your security with simulated ransomware

Nyotron says it’s easy enough for even the most junior security employee to operate
21 Sep 2020
Best free malware removal tools 2020
Malware spotted in red code on black background
Security

Best free malware removal tools 2020

Worried your device is infected? Here are the tools you need to get rid of malicious software
21 Sep 2020