Duo Security is now a part of Cisco
Effective October 28, 2019 Duo Security will be transitioning to Cisco's Privacy Statement. View the Duo Privacy Data Sheet.
Try Duo's trusted access solution now.
Software usually installed covertly, designed to compromise systems or data, invade privacy, or steal information without permission. Some examples of malware include adware, bots, keyloggers, Trojan horses, viruses, and worms.
Mitigating Credential-Stealing Malware with Two-Factor Authentication
Spear Phishing: How Attackers Use Email to Steal Privileged Information, Install Malware & Make Your Life Miserable
RSAC 2016: Demystifying a Malware Attack
Malicious Apps Bypass Security Tools to Steal Data
A Breakdown of Different Types of Point-of-Sale Malware
Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e‑books, security industry news, all handcrafted by Duo. You may unsubscribe any time.
Thanks for signing up!
By providing your contact details, you are confirming that we may contact you and that you have read and understand our General Privacy Notice