MUO

Malware

Page 5

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
real instant messenger logo 1
Why Unofficial WhatsApp Apps Are a Security Risk

YoWhatsApp is a popular MOD, but scammers encouraged users to download a fake version. It just goes to show why unofficial apps are a bad idea.

By 
Image of a USB drive on a black background  1
What Is a USB Drop Attack and How Can You Prevent It?

Got a USB drive but don't know what's on it? Cybercriminals could use this to attack your computer. Here's what you need to know.

By 
Ransomware 1
What Is Fake Ransomware and Should You Be Worried About It?

Even if you pay the ransom, your files may be gone for good. Is there any way to know whether you can get your data back?

By 
A bunch of Samsung smartphones. 1
Think Your Phone Has Been Hacked? Here's What to Do Next

Think there's a problem with your iPhone or Android device? Here's what to do if your phone has been hacked.

By 
close up shot of blue and green code  1
What Is Crimeware and Is It the Same as Malware?

Malware is malicious software, but crimeware sounds like software that can be used to carry out crimes. So do they mean the same? Not quite...

By 
picture of duck in pond behind white alert symbol  1
Facebook Business Accounts Hacked via New PHP Version of Ducktail Malware

A PHP version of the Ducktail infostealer malware is being used to compromise Facebook Business accounts.

By 
MacBook in the dark 1
3 Signs Your Mac Is Infected With a Virus (and How to Check)

Is your Mac acting weird? It could be infected with a virus. Here's how to check for a virus on your Mac.

By 
login credentials being stolen from laptop via phishing 1
New Phishing-as-a-Service Tool Poses Significant Risks

A new phishing-as-a-service tool is making data theft that much easier for cybercriminals.

By 
red and blue digital lock graphic 1
The 7 Most Common Causes of Data Breaches

Someone can hack a server, but there are much easier ways to gain access to the same information. Here's what to look out for to keep your data safe.

By 
android logo in front of matrix background 1
New "RatMilad" Android Malware Can Steal Data and Spy on Victims

A new kind of Android malware is being used against victims on smartphones to spy and steal data.

By 
Mockup of a Laptop Placed on Table Showing a Pop-up of Adware  1
What Is the Dipladoks.org Redirect Malware? How to Remove It on Windows

If Dipladoks.org keeps popping up in Windows, here's how to fix it.

By 
harley quinn cosplay with a baseball bat 1
What Is Harly Malware on the Google Play Store?

This Trojan malware silently signs you up to expensive subscription services to empty your bank account. Here's what you need to know.

By 
pile of paperclips behind alert symbol 1
How to Spot and Avoid Malicious Attachments

Malware can be spread via email attachments, but what are the tell-tale signs of a malicious attachment? Here's what to look out for.

By 
A Laptop Placed on a Table With Tablet and Book 1
What Is BBBW Malware? How to Remove It and Restore Your Data

Scammers utilize different types of malware to hold your data hostage. Here's what to do if you suddenly find BBBW files on your device.

By 
malicious software warning 1
What Is FickerStealer Malware and How Can You Remove It?

FickerStealer is a type of malware that can steal information from primarily Windows devices. How does it work? And what can you do about it?

By 
eicar-test-file 1
What Is the EICAR Test File and How Does It Work?

How can you test how effective your antivirus is? Is it really protecting you from malware? Here's a safe way to find out.

By 
man-typing-on-laptop 1
How to Install REMnux on VirtualBox

REMnux is a malware-oriented operating system based on the Linux kernel. Here's how to install and set it up on VirtualBox.

By 
image of nebula behind malware graphic 1
Hackers Exploit James Webb Telescope Image to Spread Malware

One of the stunning James Webb telescope images is now being used by malicious actors to spread malware among devices.

By 
A Computer Screen with a  1
CosmicStrand Is a Deadly New Rootkit That Targets Motherboards

Motherboards can be hacked with the CosmicStrand rootkit. Here's how to stop a remote attacker taking control of your system.

By 
rup-phishing 1
Malicious Android Apps, Cast to Xbox One, You've Been Caught in a Phishing Scam, and Raspberry Pi Projects for Beginners

Our weekly tech podcast for technophobes features security news that affects the devices you use, as well as tips to make better use of your tech.

By 
3 4 5 6 7
Page 5 / 17