Malware
Latest about Malware
![Two people texting on smartphones](https://cdn.mos.cms.futurecdn.net/4dAHj4cNZnXwoRVDib4TB3-320-80.jpg)
Many small businesses are falling well short when it comes to cybersecurity plans
By Sead Fadilpašić published
SMBs aren't raising awareness, or running exercises, on mobile security, leaving their systems open to attack.
![A white padlock on a dark digital background.](https://cdn.mos.cms.futurecdn.net/xXaZ3Lb4ZEejUv9ipwK3ha-320-80.jpg)
NordLayer adds malware detection tool to help keep businesses safe
By Sead Fadilpašić published
Real-time malware protection can help businesses keep their PCs clean.
![Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.](https://cdn.mos.cms.futurecdn.net/ThNyuwnA55tfcixfqWcEcA-320-80.jpg)
Avast security tools hijacked in order to crack antivirus protection
By Benedict Collins published
Hackers are using a legitimate Avast driver to disguise malware and turn off antivirus defenses.
![malware](https://cdn.mos.cms.futurecdn.net/tEhgdM2MKoCYRwV4Ch3awa-320-80.jpg)
2024 saw a surge in malicious free VPN apps
By Chiara Castro published
Cybercriminals increasingly use fake VPN apps to spread malware and launch other attacks. This is what's at stake.
![An abstract image of digital security.](https://cdn.mos.cms.futurecdn.net/S2k99RTyJJhGbDwQRHUsyg-320-80.jpg)
Linux devices hit with even more new malware, this time from Chinese hackers
By Sead Fadilpašić published
WolfsBane is an all-in-one malware solution hitting Linux systems, experts warn.
![Security](https://cdn.mos.cms.futurecdn.net/VnVVyRGDWNg2soXQwzKMsE-320-80.jpg)
Beyond traditional threat detection
By Matt Ellison published
Rethink cybersecurity: traditional methods fall short against advanced threats.
![Ubuntu](https://cdn.mos.cms.futurecdn.net/P6VcwGznoXwovzAzfdq68N-320-80.jpg)
Ubuntu Linux has a worrying security flaw that may have gone unseen for a decade
By Sead Fadilpašić published
Five vulnerabilities, possibly introduced a decade ago, allow crooks to escalate privileges on vulnerable devices.
![Acronis Cyber Protect 16 Advanced main image](https://cdn.mos.cms.futurecdn.net/z7orWLk4y7fpZmahsj5NFU-320-80.jpg)
Acronis Cyber Protect 16 Advanced Review
By Dave Mitchell published
Not yet ratedHybrid backup, endpoint protection and tough security measures all rolled into one easily managed solution.
Get daily insight, inspiration and deals in your inbox
Sign up for breaking news, reviews, opinion, top tech deals, and more.