Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » malware

Articles Tagged with ''malware''

Campus Security Moves to the Fore at Colleges and Universities

The Top Five Cybersecurity Defense Insights for 2020

June 12, 2020
CyberEdge's annual Cyberthreat Defense Report (CDR) reveals the top five cybersecurity insights for 2020. 
Read More
SEC0520-cyber-Feat-slide1_900px

VivaVideo, “Spyware” App Maker, Contains Remote Access Trojan and Requests Dangerous App Permissions

May 29, 2020
VivaVideo, Chinese "spyware" app with at east 100 million installs on the Android Play Store, is requesting dangerous permissions, including the ability to read and write files to external drives and an user's specific GPS location.
Read More
Revised NIST Cyber Security Framework - Security Magazine

New Malware Variant Can Steal Data from Browsers and Cryptocurrency Wallets

May 21, 2020
A Reason Labs research team has discovered a new variant of the Raccoon malware family. Initially discovered back in 2019, the Raccoon malware family is used to steal confidential data and browser information.
Read More
Doorway to Cybersecurity

Verizon 2020 Data Breach Report: Money Still Makes the Cyber-Crime World Go Round

May 19, 2020

The Verizon Business 2020 Data Breach Investigations Report (2020 DBIR) shows that financial gain remains the key driver for cybercrime with nearly nine in 10 (86 percent) breaches investigated financially-driven.


Read More
Gaps in Cybersecurity Programs

Thunderspy, New Attack Method, Allows Hackers to Steal Data in Less than 5 Minutes

May 13, 2020
Eindhoven University of Technology researcher Björn Ruytenberg revealed the details of a new attack method he's calling Thunderspy - which targets devices with a Thunderbolt port. 
Read More
cybersecurity-blog

How to Detect & Prevent Cyberattackers from Exploiting Web Servers via Web Shell Malware

May 1, 2020
A new NSA guide contains valuable information on how to detect and prevent web shell malware from affecting web servers, including detection, prevention and response strategies.
Read More
password1-900px.jpg

New Dashlane Survey: Majority of Americans Feel More at Risk Online Due to COVID-19

April 30, 2020

A new survey that looks at consumer sentiment and habits around online security in light of the shift to remote work due to COVID-19 has found that the lines between our personal and professional lives are blurring now more than ever. 


Read More
SEC0919-Mobile-Feat-slide1_900px

When Efficiency is the Outcome of Enhanced Security

IT staff aren’t tasked with increasing employee productivity, but it is often the surprising benefit of device security measures.
Simo Salmensuu
April 23, 2020
According to Verizon's 2019 Mobile Security Index report, two-thirds of organizations said they are less confident about the security of their mobile assets than other devices. Many of these breaches occur due to vulnerable devices, servers and applications that allow bad actors to gain access. Security breaches and the threat of compromise are a serious issue for organizations of all sizes.
Read More
phishing

Google Blocks 18 Million COVID-19 Related Scam Emails Each Day

April 20, 2020
Google says that Gmail blocks more than 100 million phishing emails per day. Now, Google is seeing 18 million daily malware and phishing emails related to COVID-19. This is in addition to more than 240 million COVID-related daily spam messages.
Read More
SEC1019-cyber-Feat-slide1_900px

Information Security Forum: Nine Cybersecurity Threats Organizations can Expect Through 2022

April 16, 2020
The Information Security Forum (ISF), a London-based authority on cybersecurity, information security and risk management has released Threat Horizon 2022, which highlights nine major threats, broken down into three themes, that organizations can expect to face over the next two years as a result of increasing developments in technology. 
Read More
Previous 1 2 … 18 19 20 21 22 23 24 25 26 … 30 31 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing