The Ultimate Guide to Malware
2024 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports
![Story image](../../../../../uploads/story/2024/06/13/preview_techday_a112af7a1c89156b40c5.webp)
IDC on Data Protection
Acronis launches comprehensive XDR solution for MSPs
Last month
![Story image](../../../../../uploads/story/2024/05/30/preview_Mikkel_Drucker__Logpoint_CEO.webp)
Gartner on SaaS
Logpoint names Mikkel Drucker as new CEO to drive growt...
Thu, 30th May 2024
![Story image](../../../../../uploads/story/2024/05/16/preview_img-srwNQNzCOEztc2giHJzOP3o1.webp)
Gartner on SIEM
Splunk celebrates 10 years as Leader in Gartner Magic Q...
Thu, 16th May 2024
![Story image](../../../../../uploads/story/2024/02/07/preview_img-i4BM6EUODlx8xvd7w1f34qdH.webp)
Miercom on Ransomware
Check Point Infinity platform excels in Miercom's secur...
Wed, 7th Feb 2024
![Story image](../../../../../uploads/story/2024/02/01/preview_img-gujxL7Hf7aZYYZNBcUEF0ilO.webp)
IDC on Firewall
Check Point launches Quantum Spark to boost cybersecuri...
Fri, 2nd Feb 2024
Expert columns
![Story image](../../../../../uploads/story/2024/06/28/preview_Trevor_Dearing.webp)
By Trevor Dearing of Illumio
Why the answer to AI threats is not more AI
Last week
![Story image](../../../../../uploads/story/2024/06/20/preview_techday_f4ab0d15ef268854d321.webp)
By Stephen Kho of Avast
YouTube, the backdrop of a scammer’s play
Last month
![Story image](../../../../../uploads/story/2024/06/17/preview_techday_c726e5336a017d6a715f.webp)
By Audra Simons of Everfox
Fighting back against the growing threat of ransomware
Last month
![Story image](../../../../../uploads/story/2024/06/06/preview_techday_c79ed9988a8da67dbb08.webp)
By Cradlepoint
Singapore cyber security bill amendment: Securing your ...
Last month
![Story image](../../../../../uploads/story/2024/06/03/preview_img-vOiVlQs2wmxpOdir3gSwGURs.webp)
By Gigamon
Network visibility: How to improve it and why it will i...
Last month
More expert columns
![Story image](../../../../../uploads/story/2024/05/06/preview_Anthony_Daniel_.webp)
By Anthony Daniel of WatchGuard Technologies
How the evolution of AI will reshape cybersecurity
Mon, 6th May 2024
![Story image](../../../../../uploads/story/2024/05/03/preview_31(2).webp)
By Simon Howe of ExtraHop
There is no zero trust without network visibility
Fri, 3rd May 2024
![Story image](../../../../../uploads/story/2024/05/02/preview_img-7eyWPfRIYcR4ZC7PEgtKJcnm.webp)
By Mark Gorrie of Gen Digital Inc
What is vishing? Tips to spot and avoid voice phishing ...
Thu, 2nd May 2024
![Story image](../../../../../uploads/story/2024/05/02/preview_img-HxlMgvs503iLLYQpm6B2e2yW.webp)
By Jonathan Tanner of Barracuda Networks
The remote desktop tools most targeted by attackers in ...
Thu, 2nd May 2024
![Story image](../../../../../uploads/story/2024/04/23/preview_img-SgyikLo4VXrLdCPShmHZZkVJ.webp)
By Martyn Crew of Gigamon
Five top concerns in private cloud visibility
Tue, 23rd Apr 2024
![Story image](../../../../../uploads/story/2024/04/15/preview_img-zSdRETzC1RN7ewvC2wJ0Jbrk.webp)
By Mark Gorrie of Gen Digital Inc
Watch out! There are hidden dangers lurking in your PDF...
Mon, 15th Apr 2024
Top players
You can read more from the top players Check Point Software, Apple, Trend Micro, Kaspersky, and Symantec.
Recent news
![Story image](../../../../../uploads/story/2024/06/28/preview_techday_2de3e7d80da07eaa9046.webp)
About Software Updates
Bitdefender & Netgear report reveals major IoT vulnerab...
Last week
![Story image](../../../../../uploads/story/2024/06/26/preview_techday_7434cebf4ac47077c860.webp)
About Smartphones
BlackBerry cyber report reveals 3.1 million attacks in ...
Last week
![Story image](../../../../../uploads/story/2024/06/26/preview_techday_178c2f0ed081cf164059.webp)
About Smartphones
BlackBerry thwarts 3.1 million cyberattacks in early 20...
Last week
![Story image](../../../../../uploads/story/2024/06/25/preview_techday_78cccfbb3820a536c541.webp)
About Development
Elastic discovers new attack vector in Microsoft Manage...
Last week
![Story image](../../../../../uploads/story/2024/06/26/preview_techday_2011dc7d408436244d49.webp)
About Compliance
Foregenix spins off tech to new venture Turaco Labs
Last week
More news
![Story image](../../../../../uploads/story/2024/06/26/preview_techday_bcb8707c3b58228acf59.webp)
About Cloud Services
New report details evolution of P2Pinfect into ransomwa...
Last week
![Story image](../../../../../uploads/story/2024/06/20/preview_techday_f22a068094df723fedb8.webp)
About Cloud Services
Businesses to increase cloud use by 85% in next five ye...
Last month
![Story image](../../../../../uploads/story/2024/06/19/preview_techday_a2489a08cf4c8edfd52c.webp)
About Ransomware
Global survey reveals growing inadequacies in cyber thr...
Last month
![Story image](../../../../../uploads/story/2024/06/07/preview_img-Ahgi0Xp5dGBWYFGLzwkI5hiL.webp)
About Firewall
WatchGuard report reveals surge in endpoint malware
Last month
![Story image](../../../../../uploads/story/2024/06/07/preview_img-6EqdEdqb3nd4754goBbw30DU.webp)
About Firewall
Chinese espionage campaign targeting Southeast Asia rev...
Last month
Even more news
![Story image](../../../../../uploads/story/2024/06/03/preview_img-pxmZ0SI8x9yD5pPJ3TxY2oKm.webp)
About Spam
Bitdefender report finds Discord rife with malware & sc...
Last month
![Story image](../../../../../uploads/story/2024/05/28/preview_img-VHHKhmCRt5o0Q6HT1XfuSg91.webp)
About Bring Your Own Device
NZ businesses face urgent mobile cybersecurity gaps
Tue, 28th May 2024
![Story image](../../../../../uploads/story/2024/05/23/preview_img-9aGviLzHc6cyhoLBM2PJ57Ov.webp)
About Dark web
CloudSEK exposes misuse of Pegasus spyware on the deep ...
Thu, 23rd May 2024
![Story image](../../../../../uploads/story/2024/05/17/preview_img-XCIYNNSzLJFHhW02JrqJ9Gi0.webp)
About Servers
Kinsing malware exploits Apache Tomcat on Linux clouds
Fri, 17th May 2024
![Story image](../../../../../uploads/story/2024/05/17/preview_img-sfGjANgjSY5ZI2i3kREU4awI.webp)
About Supply chain & logistics
Organisations battle AI risks amid rise in supply chain...
Fri, 17th May 2024
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Technology Gifts, Advanced Persistent Threat Protection, and Firewall.
Powered by