Never-before-seen malware is nuking data in Russia’s courts and mayors’ offices. CryWiper masquerades as ransomware, but its real purpose is to permanently destroy data. Article 696 words 12 votes
Researchers devise iPhone malware that runs even when device is turned off security smartphones Article 655 words 6 votes
A series of patent lawsuits is challenging the history of malware detection security Article 1479 words 7 votes
Winning the war on ransomware - The DOJ’s task force is changing the landscape around hackers, but will it be enough? Article 1378 words 4 votes
The Great Suspender and the problem of malware being introduced into open-source browser extensions security browsers Article 1331 words 15 votes
List of emails SponsorBlock's creator has received about inserting malware into the extension security browsers Link 17 votes
Widespread malware campaign seeks to silently inject ads into search results, affects multiple browsers security browsers Article 2280 words 18 votes
NSA and FBI warn that previously undisclosed Drovorub malware for Linux threatens national security linux security.national Article 957 words 22 votes
The confessions of Marcus "MalwareTech" Hutchins, the hacker who stopped WannaCry and was arrested by the FBI in 2017 security Article 13 662 words 33 votes
Microsoft and Intel project converts malware into images before analyzing it security microsoft Article 739 words 10 votes
Cloudflare announces free 1.1.1.2 and 1.1.1.3 DNS resolvers that block malware and/or adult content privacy Article 726 words 14 votes
Security researchers partner with Chrome to take down over 500 browser extensions in a fraud network affecting 1.7 million users privacy security google browsers Article 6799 words 12 votes
Firefox to hide notification popups by default starting next year browsers internet Article 731 words 22 votes
Recent Study Estimates That 50% of Websites Using WebAssembly Apply It for Malicious Purposes Article 1017 words 10 votes
Olympic destroyer - The untold story of the 2018 Olympics cyberattack security.cyber Article 7600 words 6 votes
The sinkhole that saved the internet: Keeping the 'kill switch' alive is the only thing preventing another WannaCry outbreak internet security Article 3380 words 20 votes
Apple pushes a silent Mac update to forcibly remove hidden Zoom web server apple privacy Article 325 words 24 votes
China's border guards are installing malware onto the phones of travellers crossing its border Article 1358 words 8 votes
WhatsApp voice calls contained a buffer-overflow vulnerability that was used to install spyware [CVE-2019-3568] security ios android facebook Article 875 words 11 votes
Invisible Malware Is Here and Your Security Software Can't Catch It security Article 1121 words 6 votes
Marcus “MalwareTech” Hutchins pleads guilty to writing, selling banking malware security Article 588 words 6 votes
A trojanized version of the ASUS Live Update Utility was signed and hosted on the official server and distributed to an estimated 1 million users Article 362 words 18 votes
Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers Article 2541 words 10 votes
At least two strains of joke ransomware have been created with "subscribe to PewDiePie" themes Article 717 words 29 votes
Hated and hunted - The perilous life of the computer virus cracker making powerful enemies online Article 3230 words 9 votes
The untold story of NotPetya, the most devastating cyberattack in history Article 6546 words 11 votes