CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
  • Showcase
    • OneTrust
  • See all results
Home
Malware
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Malware

Bug on laptop keyboard showing malware distributed to ASUS computers in a massive supply chain attack
Cyber SecurityNews

ASUS Supply Chain Attack Highlights New Security Vulnerability For Tech Giants

April 15, 2019
A massive supply chain attack had distributed malware to tens of thousands of ASUS computers worldwide through legitimate ASUS software updates. It appears as if the attackers had inside information about ASUS servers and systems. Read More
Image of gloved hand holding mobile phone showing login screen signifying Fakebank Android malware and the threat of vishing attacks
Cyber SecurityNews

Fakebank Android Malware Evolves into Vishing Attack

March 23, 2018
Latest variant of Fakebank Android malware adds even more functional threats to banking clients – in the form of ‘vishing’ (voice phishing). It can now intercept outgoing and incoming calls which is then redirected to scammers which allows them to pose as legitimate employees of the bank. Read More
Man face blended with binary code digits showing major international companies being attacked by Winnti malware
Cyber SecurityNews

Winnti Malware Rampages Through Major International Companies

August 7, 2019
Winnti malware makes a “comeback”, victimizing major international firms including Bayer, BASF, Siemens and others. The attackers are particularly interested in industrial secret and tracking movements of specific people. Read More
Image showing man in hood watching futuristic screen and cryptojacking Coinhive for Monero
Cyber SecurityInsights

CoinHive, Monero and the Controversial Rise of Cryptojacking

January 12, 2018
Are you a victim of cryptojacking? Both individuals and organizations are now at risk of this new hacking approach to tap into your computer’s processing power. Most famously, Coinhive has been promoting this controversial new practice to tap for mining the cryptocurrency Monero. Read More
Control panel dashboard of power plant showing the malware attack on India’s largest nuclear power plant
Cyber SecurityNews

Malware Attack on Administrative Systems at India’s Kudankulam Nuclear Power Plant Thought to Be Connected to North Korea

November 8, 2019
India's largest nuclear power plant was recently under malware attack on their administrative systems, which was isolated and prevented attackers from gaining access to the plant controls. Read More
Image of waves crashing on rocks around lighthouse signifying the waves of DDoS attack and the different attack vectors
Cyber SecurityInsights

DDoS Attack Glossary: Top 12 Attack Vectors

March 7, 2018
Because of the significant damage a DDoS attack can cause, many IT teams will put protecting against the threat high on their agenda. However, what many IT teams may be completely unaware of is that there are a wide variety of different types of DDoS attack vectors in a cybercriminals’ arsenal. Read More
Policeman arresting hacker showing GozNym cyber crime group going out of business after U.S. federal court charged their ringleaders
Cyber SecurityNews

GozNym Cyber Crime Group, Responsible for Theft of Over $100 Million, Put Out of Business

May 23, 2019
Known for their cyber crime product which infected over 41,000 victims in financial institutions, GozNym is going out of business with their key figures across Eastern Europe charged by U.S. federal court. Read More
Image of hacker taking data from mobile phone representing how malware like fake WhatsApp and Lovelly Wallpaper begs the question of whether the Play Store can still be trusted
Cyber SecurityInsights

Fake WhatsApp, Lovely Wallpaper … Can the Play Store Still be Trusted?

November 20, 2017
With the Play Store distributing malicious apps like fake WhatsApp and malware, is downloading only from trusted Android stores still a relevant approach? Read More
Padlock in front of WhatsApp logo showing the WhatsApp Hack used by Israeli surveillance technology firm in spy program
Cyber SecurityNews

Israeli Surveillance Technology Firm Used WhatsApp Hack in Spy Program

November 6, 2019
Facebook-owned WhatsApp is suing Israeli surveillance technology firm NSO Group. It alleged that NSO group exploited a WhatsApp hack to spy on more than 1,400 people in 20 countries. Read More
Computer code on a screen with a skull showing researchers using a few simple strings in code to trick Cylance antivirus into thinking malware as trusted software
Cyber SecurityNews

Researchers Trick Cylance Antivirus Into Thinking Malware Is Trusted Software

August 2, 2019
Just a few simple strings on malware are all it takes to defeat Cylance antivirus software. This is a crushing blow for those who predicted AI and machine learning are the future of antivirus protection. Read More
Load More

Get Connected

  • 7.9kFans
  • 12.7kFollowers
  •  Followers
  •  Subscribers

Stay Updated

Subscribe to our newsletter.

Thank you for subscribing!

Something went wrong.

We respect your privacy

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Thank you for subscribing!

Something went wrong.

We respect your privacy

Follow us

© 2019 Data Privacy Asia Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
  • Showcase
    • OneTrust
Start typing to see results or hit ESC to close
Regulations U.S. Cyber Threats EU GDPR Data Breach
See all results
Username
Password
Remember Me
Lost password?
Create an account
Enter username or email
Cancel