malware - News, Features, and Slideshows

malware in pictures

  • IN PICTURES: The most destructive viruses of all time

    IN PICTURES: The most destructive viruses of all time

    The world of computer viruses has changed drastically over the last 25 or so years. In the early days, internet users were very naïve towards email attachments, contributing to the alarming speed that viruses could spread across the globe. These days, viruses very rarely land in our inboxes due to preconfigured firewalls and strict measures from the likes of Gmail and Outlook. SSLs.com compiled this list in looking at the destructive viruses that wreaked havoc on the Internet

    IN PICTURES: The most destructive viruses of all time
  • In Pictures: 7 steps to protect your business from cybercrime

    In Pictures: 7 steps to protect your business from cybercrime

    As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattacks.

    In Pictures: 7 steps to protect your business from cybercrime
News about malware
Features about malware

Whitepapers about malware

  • 5 Cyberthreats that Slip Past Traditional Antivirus

    Many traditional antivirus (AV) programs operate on signatures—as malicious software is discovered, a signature describing the file is generated, added to a database, then the database gets pushed out to the customer base. Signature-based AV solutions can have a hard time keeping up with this volume, often leaving devices vulnerable. Over time, we have seen the rise of new defenses; however, each defense triggers a corresponding change in tactics from the bad guys. These changes include malware designed not just to exploit vulnerabilities, but to outwit an AV’s defenses. Here are 5 types of attacks that slip past traditional antivirus.

  • Datto’s State Of The Channel Ransomware Report 2016