MUO

Malware

Page 9

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Folder and file icons with a question mark are seen on a blue background 1
Downloaded a Suspicious File? Here’s How to Check if It Contains Malware

Accidentally downloaded a file you suspect might be a virus? Or what if you think a link goes to a malicious site? Here's what to do.

By 
Monitors with Android logo seen before a human eye 1
Monitoring Software pcTattleTale Accidentally Leaks Phone Screenshots

Stalkerware can be used to keep track of employees, family members, or anyone else. And this data can be accessed by cybercriminals too...

By 
A gamer playing games 1
A New Malware Strain Is Stealing Gaming Accounts: Here's How

One bad download could cost you your entire library... but there is a way to stay safe.

By 
tanglebot malware 1
TangleBot: New Malware Uses COVID-19 Misinformation to Target Android Users

Beware this recent smishing scam involving false vaccine appointments and misinformation to trick you into surrendering your personal data.

By 
Digital illustration of trojan horse malware. 1
Here's What You Need to Know About the Dridex Trojan Horse

It's been described as the most prevalent malware in the world. But what is Dridex? And how do you protect yourself?

By 
solarwinds logo feature background 1
What Was the Impact of the SolarWinds Hack?

Sometimes known as the Sunburst hack, the SolarWinds data breach was a turning point for cybersecurity. Here's what happened.

By 
Bluetooth on a phone 1
What Is the Braktooth Bluetooth Bug and Are You At Risk?

A new vulnerability for Bluetooth, called "BrakTooth," can really mess up your day. Here's how it works.

By 
destructive malware attack in Internet History 1
The 8 Most Notorious Malware Attacks of All Time

Knowledge is your first line of defense, so here are some of the worst viruses you need to know about, including Trojans, worms, and ransomware.

By 
featured image for office MSHTML bug 1
How Hackers Are Exploiting Microsoft Word Documents to Hack Windows

A nasty new exploit means that simply opening a compromised Word document can cause huge damage to your system.

By 
illustration of a magnifying glass scanning computer with blue background 1
How Does Antivirus Software Work?

Antivirus programs keep our computers safe on a daily basis, but how do they do their job?

By 
android flubot malware 1
What Is Flubot Malware on Android?

Android users need to know about this spyware that can be spread by SMS and steals financial data.

By 
Image emphasizing cybersecurity. 1
What Is Malware-as-a-Service?

Hackers can employ Malware-as-a-Service to make money and gain personal information. So what is MaaS? How can you protect yourself?

By 
has your device been infected by a virus 1
What You Need to Know About the Android FlyTrap Malware

The FlyTrap malware is set up to hijack your Facebook account. Here's how to protect yourself from it.

By 
photo of a laptop with pirate symbol 1
AdLoad Adware Evades Apple's XProtect Defense: What You Need to Know

This adware can get around Apple's security defenses. So what is AdLoad? What does it do? And how can you protect yourself?

By 
Plastic-Duck-Casting-Dark-Shadow-Reflecting-LemonDuck-Malware 1
How the LemonDuck Malware Targets Businesses and How to Stay Protected

Both LemonDuck and its nastier brother LemonCat pose a huge threat to businesses, but there is a way to protect your assets from it.

By 
Man sat staring at a MacBook on a table 1
How to Catch and Remove Hidden LaunchDaemons and LaunchAgents on Mac

LaunchDaemons and LaunchAgents can have a dark side. Here's how to monitor them and keep your Mac safe.

By 
Avoid malware on adult websites 1
How to Protect Yourself From the XLoader Malware

Originally Windows-based malware, the Xloader has now evolved into attacking Mac users as well.

By 
Playing on iPhone 1
What Is Pegasus Spyware and Should You Be Worried About It?

Pegasus can be downloaded onto any iOS or Android device and can spy on your activities. Here's what you need to know.

By 
website hack reason 1
10 Reasons Cybercriminals Hack Websites

Cybercriminals try to attack sites and blogs. But why do hackers actually hack websites? What do they get out of it?

By 
 1
My Smartphone Is Too Hot: Does It Have a Virus?

Your smartphone overheating can be a sign of malware. So what can you do? What else can make your phone get too hot?

By 
7 8 9 10 11
Page 9 / 17