Play VideoBefore you click on that audio link: WAV files are being used to transfer malwareSteganography malware trend moving from PNG and JPG to WAV files.October 28, 2019 by ZDNet Editors in Security
Play VideoRansomware: The new cost of doing businessRansomware -- the most high-profile tool in the cybercriminal arsenal -- is on the rise in attacks against businesses.April 10, 2018 by ZDNet Editors in Security
Play VideoBanking Trojan Ursnif returns with new redirection techniqueAn updated Trojan can trick users into entering their credentials into fake bank websites.December 6, 2017 by ZDNet Editors in Security
Play VideoFraudsters "resuscitate" SpamCannibal to spew out more spamMiscreants have tampered with the service to pump out spam and tell you that every IP address you check is suspicious.June 4, 2018 by ZDNet Editors in Security
Play VideoHow was Bezos phone hacked? Probably using Pegasus-3 spywareBezos hack connected to Khashoggi murder and The Washington Post's subsequent media coverage.January 24, 2020 by ZDNet Editors in Security
Play VideoiOS introduces data lock feature, ignoring pressure from law enforcementRestrictions on the USB port are said to be "aimed squarely at law enforcement."May 11, 2018 by ZDNet Editors in Security
Play VideoBusinesses on GDPR compliance: Challenging but worth itOnly 59 percent of the enterprise is meeting the EU’s regulatory requirements today.January 29, 2019 by ZDNet Editors in Security
Play VideoRansomware: Industrial control systems are under attackEkans ransomware is designed to target industrial systems in what researchers describe as a "deeply concerning evolution" in malware.February 13, 2020 by ZDNet Editors in Security
Play VideoCybersecurity tips for employees who are working from homeSwitching to remote working because of the coronavirus can create cybersecurity problems for employers and employees. Here are some things to watch.March 18, 2020 by ZDNet Editors in Security
Play VideoReport: Data storage vulnerabilities found in 76% of mobile appsResearchers say they could lead to passwords, financial information, user locations, and other personal data being accessed by cyber attackers.June 26, 2019 by ZDNet Editors in Security