Researchers say WireLurker can infect installed iOS applications, automate a generation of malicious iOS applications and spread through enterprise provisioning.
Showing results 1 to 20 of 147
"SynoLocker" malware infects through a vulnerability in older versions of their NAS software. The attack demands 0.6 BitCoins (about $350) to decrypt files.
Firefox has blocked known phishing and malware sites for some time. Now it will check reputation on individual files and soon use file signatures.
One of the challenges of using Cloud-based big data or media applications is moving big files and objects into the cloud. IBM acquired Aspera just to address this issue. Signiant, long a player in broadcast and other media, says don't forget us.
Malicious RTF files could execute code. Microsoft has released a "Fix it" temporary workaround which disables RTF support in Word.
According to Trend Micro, consumers are being placed at risk due to rising rates of malware aimed at online banking and malicious applications.
According to Trend Micro, there are over one million malicious applications currently up for download on the Android market.
Google has found a fix for a vulnerability in Android's security model that could allow attackers to convert 99 percent of all applications into Trojan malware.
Malwarebytes has launched a backup service that includes scanning files for malware. It backs up multiple Windows PCs, and Android and Apple iOS devices, with optional encryption to protect your files in the cloud.
The smartphone maker and anti-virus firm are joining up to help provide BlackBerry users greater ease of mind over an increase in malware-laden mobile applications.
Sophos' antivirus solution began marking its own updates as false-positive malware, which deleted critical files in the system's live protection program.
Security companies have detected a piece of malware that steals files from infected machines, then renders the computers useless by overwriting their master boot record.
This affordable utility provides an easier way to compress and email large files, and integrates well with Microsoft Office applications.
Dubbed ACAD/Medre.A, malware targets AutoCAD software, steals and sends files to e-mail accounts located in China, says security vendor ESET, which is working with Chinese firms to prevent further harvesting of data.
Malware makers are turning to quite sophisticated tricks to disguise the true purpose of rogue applications.
Amazon's new "Send to Kindle" option makes it possible to transfer files from Windows applications to the Kindle.
Adobe has taken a few security hits lately, from the Flashback Mac Trojan and another zero-day exploit in Flash Player to malware-laden PDF files being the hacker's weapon of choice. So what gives?
The malware installs a backdoor that contacts a remote server for instructions and can be used to steal files or capture a screenshot of the infected computer system.
Cyber crooks are infecting popular mobile platforms through malicious applications and, unfortunately, no mobile platform is immune from the destruction it can cause.
Social engineering has become the dominant method of distribution for fake antivirus software these days. Google Chrome puts you at risk: in my testing, malware broke through Chrome's defenses in four clicks. Internet Explorer 9 flags the exact same sites and files as suspicious. What's really going on?