MUO

Malware

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.

latest

A news report about deepfakes 1
RUP
Political Deepfake Controls on Meta, Spot Phishing Emails, and What Is a Gaming IEM? [Podcast]

Spot phishing emails, understand gaming IEMs, and learn about Meta's deepfake controls on this informative podcast.

By 
Detecting malware 1
What Is Dropper as a Service? The Delivery Service for Malware Developers

Dropper malware can sneak viruses onto your system, and they're currently being sold by the thousands on the black market.

By 
Typing on a smartphone keyboard 1
How to Detect a Keylogger on Your Smartphone

Keyloggers can reveal your every move, but there are ways to spot them before the damage is done.

By 
secure file transfer 1
Were You a Victim of the MOVEit Breach? Here's What You Need to Know

The MOVEit breach is one of 2023's biggest ransomware attacks and has affected millions of people worldwide.

By 
An image of a laptop with a warning on the screen with the Google Bard Logo 1
Don't Download the Google Bard App—It's Malware

Scammers are exploiting Google Bard and tricking people into downloading malware, but there are some easy ways to avoid it.

By 
PC motherboard 1
What Is a Cold Boot Attack and Can You Defend Against It?

When you flick the switch on your computer off, it takes the data stored in your RAM with it, right? Don't be so sure.

By 
hardware crypto wallet next to seed phrase card and crypto coins 1
The 10 Biggest Crypto Hacks and Scams of 2023

2023 has been a tough year for crypto security, but which platforms suffered the most?

By 
MacBook Pro showing a folder of Adobe apps in the Dock 1
Keep Your Devices Secure: 6 Important Things to Remember Before Installing Apps

Considering downloading an app? Make sure you take these precautions before doing so.

By 
Computer screen displaying a  1
Google's "Unusual Traffic" Error: What It Means and How to Fix It

Google might show that its systems "have detected unusual traffic" from your device. Does this mean you're infected with malware? Not necessarily...

By 
QR code on iPhone screen 1
What Is Quishing? How Can You Prevent a Quishing Attack?

Quishing turns QR codes into dangerous attack vectors. Here's how to stay safe.

By 
Fake USB hacking cable 1
How to Protect Your Devices From a Fake USB O.MG Cable

A seemingly harmless USB cable can result in your devices being hacked.

By 
anonymous mask on back of man's head wearing hoodie 1
Why Does "Anonymous" Launch DDoS Cyber Attacks?

The "Anonymous" hacker group is known for its DDoS attacks, but why is this the case?

By 
person on laptop with 3D alert page in front of screen 1
Can You Trust File Malware Scanners?

No one wants malicious code in their files. But can file malware scanners really be trusted to help with this issue?

By 
A smartphone with a wifi icon and hacker  1
What Is a Wi-Fi Karma Attack?

Wi-Fi karma attacks put you and your data at risk. Here's why...

By 
An illustration of fake ChatGPT logos 1
These 9 Fake ChatGPT Virus and Malware Apps Can Steal Your Data

Does ChatGPT have viruses? Malicious counterparts certainly do. Here are nine fake chatbot alternatives that you need to steer clear of.

By 
digital graphic of wifi symbol encircled by satellite on grid background 1
What Is Wi-Fi Eavesdropping? Understanding the Risks and How to Stay Secure

Cybercriminals can listen in on your Wi-Fi activity by eavesdropping. Here's how it works and how you can avoid it.

By 
An android phone placed on top of a keyboard 1
6 Security Threats Android Users Face in 2023

Your Android smartphone faces a lot of problems courtesy of cybercriminals. Here's what to watch out for right now.

By 
photo of people talking together around a desk 1
What Are Ransomware Negotiators and How Can They Save You Serious Cash?

You might not have heard of a ransomware negotiator before. Here's what they can do and why the role is essential.

By 
close up shot of person removing cpu from motherboard 1
CPU
Can Your CPU Be Hacked?

Yes, your hardware is vulnerable to cyberattacks, so how can hackers target your Central Processing Unit?

By 
An open laptop with a black pirate flag against a red background on the screen. 1
Killware vs. Ransomware: What's the Difference?

Killware and ransomware are both types of cyberattacks, but do you know how to differentiate them?

By 
See more articles +