MUO

Malware

Page 4

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Person with money in front of an ATM 1
What Is an ATM Jackpotting Attack and How Does It Work?

ATMs dispense huge sums of cash every day, and that makes them a big target for hackers.

By 
multiple spam warning signs 1
What Is Malspam and How Can You Protect Yourself?

Spam is annoying, but malspam is dangerous. Don't click any links or download attachments, and back away slowly.

By 
Finger seen above a smartphone keyboard  1
My Smartphone Keyboard Isn't Working Properly: Is Malware the Cause?

Malware can cause all sorts of performance issues on devices, including your iPhone or Android device. So does that include your keyboard too?

By 
Computer screen displaying a  1
Google's "Unusual Traffic" Error: What It Means and How to Fix It

Google might show that its systems "have detected unusual traffic" from your device. Does this mean you're infected with malware? Not necessarily...

By 
person in dark room holding phone with tiktok app open 1
Hackers Are Spreading Malware via TikTok's "Invisible Body" Challenge

A popular TikTok challenge is being exploited by hackers to spread infostealer malware.

By 
vpn app open on laptop screen 1
VPN
Does a VPN Protect Against Malware?

Do you really need an antivirus suite if you already have a VPN? Is a VPN an all-in-one-security solution? Here's what you need to know.

By 
Person with Mask Sitting on Chair In front of a Computer Screen  1
How to Prevent Remote Access Trojan Attacks and Stay in Control of Your PC

Remote access trojans grant attackers full control over your machine—a terrifying scenario. Here's how to beef up your defenses.

By 
A bomb rigged to explode in four minute 16 seconds 1
Zip Bombs: What They Are and How to Protect Yourself

Rather than blow your PC to bits, these nasty little files can expand to fill your machine with more data than it can handle.

By 
postal-scams 1
Love Online Shopping? 5 Postal Scams You Should Avoid

Online shopping has soared in recent times, so you need to know about these postal scams targeting mail order customers.

By 
A Computer Screen with a  1
Form-Grabbing Malware: A Silent Threat to Your Online Security

Form-grabbing malware can be more effective than keyloggers, but there are many ways you can protect yourself and your personal data.

By 
Paper bats against orange background 1
What Is the BatLoader Malware and How Does It Work?

This scary malware is spreading through fake adverts for real products. Here's everything you need to know about BatLoader.

By 
malwarebytes logo on data breach background feature 1
5 Reasons to Upgrade to Malwarebytes Premium: Yes, It's Worth It

While the free version of Malwarebytes is awesome, the premium version has a bunch of useful and worthwhile features.

By 
anonymous hooded figure on laptop hidden by question mark 1
42,000 Imposter Domains Used by Chinese Hackers in Huge Phishing Campaign

Thousands of imposter domains are being used in a massive brand impersonation phishing campaign.

By 
black and white photo of trojan horse 1
What Is a Trojan Horse in Cybersecurity? How Does It Work?

Most people have heard of Trojan malware, but what is it? What are the most prevalent types? And how can you stay safe?

By 
Close-up Photography of Black and Green Computer Keyboard Keys 1
How to Find and Remove WMI Persistence Malware From a Windows PC

WMI persistence malware can hide on your computer in plain sight. Fortunately, it's easy to get rid of it from a Windows PC.

By 
locked laptop and skull flag 1
What Is Screen Locker Ransomware and How Can You Remove It?

Screen Locker is a duplicitous ransomware that locks you out of your device but doesn't necessarily encrypt all your data.

By 
photo of tiger in river 1
What Is Big Game Hunting and Are You at Risk?

In the world of cybersecurity, big game hunting isn't anything to do with the most exotic animals; instead, it's how criminals focus on huge targets.

By 
malware infected mac 1
Mac
How to Remove Search Marquis From Your Mac

Does your browser load up Search Marquis every time you open it? Learn what it is and how to remove it from your Mac.

By 
graphic of data being stolen and unlocked padlock 1
What Is an Infostealer? Is It Dangerous?

Everyone can be targeted by infostealer malware. But what is it? How does it work? And what are the most common examples doing the rounds right now?

By 
Error message on phone 1
How to Prevent Malware on Your Android Device

If your Android phone gets hit by malware it can put your personal data at risk. Here are some top tips on how to avoid it.

By 
2 3 4 5 6
Page 4 / 17