The malware hits keep coming. Just as the defenses there are new attacks via spyware, adware, viruses and worms. Keep current with the latest threats, which are increasingly creative.
Articles about Malware
After several major security breaches, is there's another way to do things?
Better security in software has forced attackers to rely more on deceptive practices, tricking people rather than software, according to Microsoft's latest Security Intelligence Report.
A recent RAND Corporation report on the black market for hacks, cracks, data theft, botnets, and zero days tells us your hacked Amex Black fetches a decent price, but only if you're not an American.
Anyone who shopped for LaCie products in the last year could be at risk.
The service is part of SecureWorks' Advanced Threat Services portfolio - a suite of Internet security services designed to combat advanced threat actors and the risks they pose.
Cryptocurrency-mining malware on mobile devices might not be deliver great returns, but they will harm your device.
China and the US were countries with the biggest spammers, but at 6th place, India could soon get that dubious top slot once internet penetration rates ramp up
With the end of Windows XP support looming, ATMs worldwide are left vulnerable -- and cyberattackers are taking advantage of the fact.
Malwarebytes Anti-Malware Premium has introduced heuristics-based detection designed to identify malicious software based on behavior instead of on virus signatures, and "will support XP users for life".
The US National Security Agency (NSA) has denied claims that it conducts indiscriminate hacking and says it doesn’t impersonate US social media or websites.
Apple rushed the release of iOS 7.0.6 on Friday with a patch for a shockingly overlooked SSL encryption issue that leaves iPhone, iPad and Mac computer users open to a man-in-the-middle (MITM) attack.
Rick Vanover and Jason Perlow talk about the risks of specific "free" software that can cause issues on computer systems through adding pop-ups, sending information or proxy serving other traffic.
How did the cyberattack on Target, which resulted in the theft of millions of records, take place?
“The Mask” (aka Careto) cyber-espionage malware has claimed 380 unique victims between 1000 IPs in 31 countries, according to the Kaspersky Lab security research team.