The earliest worms and viruses were created for geeky fun and did little harm - oh, how times have changed. Here are 20 worms, viruses and botnets that show the evolution of malware, from Creeper to Flame.
Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cybercriminals with an opportunity to launch attacks in a botnet-like fashion, according to a report from Australian security consultancy ...
In one of the photos, the dark-haired, bearded hacker is peering into his computer's screen, perhaps puzzled at what's happening. Minutes later, he cuts his computer's connection, realizing he has been discovered.
Security researcher Zoltan Balazs has developed a remote-controlled piece of malware that functions as a browser extension and is capable of modifying Web pages, downloading and executing files, hijacking accounts, bypassing two-factor authentication...
Many smartphone users are wondering whether their Android, Nokia and BlackBerry devices are spying on them after security researcher Trevor Eckhart recently claimed that a piece of diagnostic software on the phones was acting like malware.
A new Android Trojan program that poses as an SMS management application is sending text messages to predefined premium-rate numbers in Europe and Canada, according to security researchers from Kaspersky Lab.
Antivirus experts disagree with Chris DiBona, Google's open-source programs manager, who recently said that there is no virus problem on the Android platform and that companies selling anti-malware software for mobile operating systems are charlatans...
Smartphones and tablets are evolving from niche luxury devices to mainstream consumer gadgets. As mobile devices become a ubiquitous part of the mainstream culture, malware developers are paying attention and are anxious to exploit the fertile new te...
Researchers from security vendor F-Secure have spotted a rare malicious software sample that carried a valid code-signing certificate from a Malaysian governmental institution.
The U.S. Department of Justice is charging seven individuals with 27 counts of wire fraud and other computer-related crimes, alleging that the group hijacked four million computers across 100 countries in a sophisticated clickjacking scheme.
Security research firm NSS Labs has released an open source scanning tool that is capable of detecting all malicious drivers used by the new Duqu threat, according to its engineers. However, other security vendors believe that the malware's creators ...
Facebook's fake account detection mechanisms can be defeated 80 percent of the time with the help of automated tools, researchers from the University of British Columbia (UBC) have found after an eight-week test.
A newly identified Mac OS X Trojan bundles a component that leverages the processing power of video cards (GPUs) to generate Bitcoins, a popular type of virtual currency.
A new variant of the DroidKungFu Android Trojan is posing as a legitimate application update in order to infect handsets, according to security researchers from Finnish antivirus vendor F-Secure.
Experts from security vendor ESET warn that TDL4, one of the most sophisticated pieces of malware in the world, <a href="http://blog.eset.com/2011/10/18/tdl4-rebooted">is being rewritten and improved</a> for increased resilience to antivirus detectio...
Most Popular Reviews
- 1 Microsoft Surface Pro 3 Windows 8.1 tablet
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 LG G3 review
- 4 Nokia Lumia 930 review
- 5 Asus G550JK gaming notebook
Best Deals on GoodGearGuide
Latest News Articles
- Toshiba sensor to sharpen smartphone photos
- Samsung's 3G Gear S could pave the way for the smartphones of the future
- Google's Project Wing building drone delivery service
- Poaching drivers may be the norm for ride-sharing companies
- Valve sued by ACCC over Steam's refund policy
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.