The malware hits keep coming. Just as the defenses there are new attacks via spyware, adware, viruses and worms. Keep current with the latest threats, which are increasingly creative.
Articles about Malware
.. a GTA app that I thought was free.
FireEye and Symantec have independently found links from the most recent IE zero-day exploit with other attack campaigns.
According to Trend Micro, consumers are being placed at risk due to rising rates of malware aimed at online banking and malicious applications.
FireEye has followed up on their report of a zero-day attack on Internet Explorer with deeper analysis. It seems to come from the same gang that launched the recent Operation DeputyDog attack.
According to new research, enterprise malware analysts often address data breaches which are kept under wraps by companies.
Emily Williams wasn't real, but the two hackers who created her from social media profiles got her a government job, a company laptop, VPN credentials - and compromised a government network.
A small percent of Buffer customers have been sending spam to Twitter and Facebook, but many have instead been impressed by the company's response and positivity to the attack.
The country had 11 percent of cybercrime victims falling to this form of virtual extortion and saw an 8 percent rise in average cost per victim to US$207, according to the 2013 Norton Report.
A new National Cybersecurity Advisory Council has been formed in same week trojan discovered on POS servers.
Smartphones (and tablets) are just open hotspots for trouble waiting to happen if their owners don't take precautions immediately.
The alleged creator of notorious malware toolkit Blackhole has been arrested by Russian police.
If you have 1.9 million bots at your disposal, which do you think would make more money? Apparently the criminals have figured that out for us.
The research might seem like Aussies are overconfident, but 90 percent actually have security software installed on their PC.
Criminals are actively abusing the zero-day vulnerability found in Internet Explorer, with exploit code now being found in the wild.
The National Security Agency bought hacking tools from a security firm, based on documents unearthed by a FOI request.