Malware

Agencies Warn of Coronavirus-Related Scams  

The government is trying to curb scammers preying on the public’s fears.

CISA, FBI and DOD Issue Warning on North Korea-Linked Malware

New threat variants allow Hidden Cobra to remotely access and control systems—and banks should look sharp.

Charging Your Phone Using a Public USB Port? Beware of 'Juice Jacking.'

Those in need of a battery boost need to keep some security tips in mind.

How Iran's Military Outsources Its Cyber Threat Forces

These intermediaries are loyal to the regime but separate from it.

What’s Next for Iran’s Cyber Actors?

The country has grown as a talented, and destructive, network threat over the last several years.

Like Voldemort, Ransomware Is Too Scary to Be Named

Wary of alarming investors, companies victimized by ransomware attacks often tell the SEC that “malware” or a “security incident” disrupted their operations.

The Zero-Day War? How Cyber is Reshaping the Future of the Most Combustible Conflicts

Recent history has shown that states often use their offensive cyber arsenals to achieve surprisingly de-escalatory effects.

Stealthy Tool Detects Malware in Javascript

A new open-source tool called VisibleV8 allows users to track and record the behavior of JavaScript programs without alerting the websites that run those programs.

Russian Hackers Co-Opt Iranian Cyber Tools to Attack 35 Countries, NSA Warns

In a joint advisory, U.S. and British authorities said the Turla group is piggy-backing off the work of Iranian rivals to advance its own agenda.

Get Proactive to Better Arm Yourself Against Cyberattacks

Agencies must move to an integrated data-driven approach aimed at predicting and preventing cyber threats.

New Tech Aims to Tell Pilots When Their Plane Has Been Hacked

Raytheon is pitching a product to detect cyber intrusions into aircraft, drones and even missiles.

Why I Changed My Mind about Federal User Cyber Training

Layer on all the protective systems you want—at the end of the day, the user still has to make a good decision.

9 Tips to Help Secure Every Federal Employee’s Mobile Device

Bad actors increasingly target smartphones and endpoint devices that are generally less protected than government computers.

Apple iPhones Could Have Been Hacked for Years—Here's What to Do About It

As there is no visible sign of infection on the device, it is likely users are completely unaware of the risks they’re facing.