< Personal
Find the right product
Infected already?
< Business
Learn more about Security Advisor (available in every bundle). >
< Pricing
Protect your personal devices and data
Protect your team’s devices and data
Step up your corporate endpoint security. Save up to 45%
< Partners
< Resources
The State of Malware 2023 Report
< Support
March 6, 2014 - A team of researchers at the University of Liverpool developed a virus dubbed Chameleon that travels over WiFi networks and spreads...
February 26, 2014 - You’ve probably heard by now of Facebook purchasing the popular messaging application WhatsApp was recently purchased for the sum of $19 billion,...
February 20, 2014 - The University of Maryland (UMD) said it was the victim of a recent cyberattack, according to their statement released Wednesday. In...
February 19, 2014 - Occasionally, malware will take a different route to achieve its desired effects by using Component Object Model objects. Component Object Model,...
February 13, 2014 - It’s quite common for malware to take code from the Windows API and use it for a malicious purpose. For example,...
February 12, 2014 - The Citadel Trojan is nothing new, but I found one recently obtained from our collection systems and had a fun time...
February 6, 2014 - It’s not uncommon for the malware of today to include some type of built-in virtual machine detection. Virtual Machines (VMs) are...
January 29, 2014 - As cloud computing becomes more popular, malware authors are also taking interest in using this technology to store their own files—except,...
January 23, 2014 - Facebook awarded its highest bug bounty to date to a Brazilian Security Engineer Reginaldo Silva, yesterday. The bounty, an estimated total of...
Contributors
Threat Center
Podcast
Glossary
Scams
Select your language