What Is a Rootkit?
What is a rootkit attack? By definition, rootkits remain hidden on your machine, so how can you detect and prevent them?
What Is Cydia on My iPhone and What Does It Mean for My Security?
Bought a second-hand iPhone and found the Cydia app on there? Here's what Cydia is and what that means for you.
When Malware Has Morals: The Case of “Vigilante” Attacks
Malware isn't always bad: sometimes, it can be used to dissuade people from illegally pirating content.
Microsoft Delivers Security Patch for Critical PrintNightmare Exploit
The zero-day exploit is affecting thousands of users worldwide.
Ransomware Group Demands $70m Bitcoin Payment to Unlock Infected Computers
The REvil crime group strikes again.
Microsoft Tells Users to Switch Off Printer Spooling to Protect Against Zero-Day Exploit
The PrintNightmare zero-day is being actively exploited.
What Are Secured-Core PCs and How Do They Protect Against Malware?
Secured-core PCs are designed to thwart persistent malware attacks, notably firmware malware. Here's what you need to know.
Why Android Users Should Care About Dynamic Code Loading
What is dynamic code loading and why might it present a security risk to Android users?
What Is TrickBot Malware and How Can You Protect Yourself?
One of the most persistent botnets of all time, the TrickBot malware has evolved over time. Here's how to protect yourself.
What Is Cryptojacking and How Do You Detect It?
Cryptojacking malware can take over your computer and steal its resources. But how can you detect it?
Update to macOS Big Sur 11.4 to Stop Attackers From Taking Secret Mac Screenshots
Updating will prevent malware from taking surreptitious screenshots or secret screen recordings.
Apple Exec Admits macOS Malware Has Now Hit Unacceptable Levels
Blasting macOS security is one way to tout the benefits of the iOS platform.
How to Remove Malware Using Microsoft Defender's Offline Scan
Tricky malware? Use a Microsoft Defender Offline scan to remove it for good.
Over 25 Percent of Tor Exit Nodes Could Be Spying on Your Data
A malicious party is using the exit nodes to spy on users, and more.
Ransomware Attack Forces Top US Gas Pipeline to Halt Operations
The investigation is still in its early stages, and it is unclear whether Colonial Pipelines plans to pay the ransom.
How to Use PowerShell to Scan Windows 10 for Malware
PowerShell is a powerful tool. Here's how you use it to scan your system for malware.
What Is a Worm and How Does It Get on Your Computer?
Peskier than a computer virus, a worm can self-replicate and cause serious damage to a vulnerable machine.
Install macOS Big Sur 11.3 ASAP to Protect Your Mac Against the Shlayer Malware
macOS 11.3 patches a major bug that let the Shlayer malware bypass Apple’s protections like GateKeeper and File Quarantine.
The DOJ Has Formed a New Taskforce to Tackle Ransomware
Ransomware is a massive scourge on society. Can a new task force help fight back?
Android Flubot Malware SMS Scam Cases Surge Across UK and Other Countries
Don't fall for the Flubot malware SMS scam.