The malware hits keep coming. Just as the defenses there are new attacks via spyware, adware, viruses and worms. Keep current with the latest threats, which are increasingly creative.
Articles about Malware
Apple rushed the release of iOS 7.0.6 on Friday with a patch for a shockingly overlooked SSL encryption issue that leaves iPhone, iPad and Mac computer users open to a man-in-the-middle (MITM) attack.
Rick Vanover and Jason Perlow talk about the risks of specific "free" software that can cause issues on computer systems through adding pop-ups, sending information or proxy serving other traffic.
How did the cyberattack on Target, which resulted in the theft of millions of records, take place?
Researchers shared their discovery and research on espionage malware "The Mask" (aka Careto) at the Kaspersky Labs security summit this week. ZDNet took photos of the presentation.
“The Mask” (aka Careto) cyber-espionage malware has claimed 380 unique victims between 1000 IPs in 31 countries, according to the Kaspersky Lab security research team.
Kaspersky's security research team today revealed "one of the most advanced" cyber-espionage malware threats "The Mask" (aka Careto). Victims including government institutions, private equity firms and high-profile activists are exploited.
NHS visitors in search of health information were met with viruses or adverts instead.
While unsurprisingly Microsoft's Internet Explorer and Java were very vulnerable, Google's Chrome operating system was listed as the third most vulnerable system in 2013.
The federal agencies warn that retailers' point of sales systems are being targeted by criminals.
While the percentage of spam in email flows fell to 69.6 percent in 2013, shady advertisers have adapted and developed some new tricks to slip past even the most vigilant spam filters.
An Israeli startup has launched into the security market with a firewall product it says is 'context aware' and predicts the behavior of cyberattacks and threats.
It used to be Adobe and maliciously crafted Word, Excel, and PowerPoint documents, but Java now takes the cake compared to those methods, according to Cisco.
The cloud is becoming an increasingly appealing place for malware distributors to host their code.
The world's longest-running hacker conference Chaos Communication Congress opens its 30th year with a keynote from Glenn Greenwald this week in Hamburg, Germany. 30C3 has this, and so much more in store.