The malware hits keep coming. Just as the defenses there are new attacks via spyware, adware, viruses and worms. Keep current with the latest threats, which are increasingly creative.
Articles about Malware
If you missed Black Hat USA 2014, we've got good news: Some of BHUSA's best talks now have videos and presentation materials online.
Leading security conference Black Hat showcased its 2014 USA vendors and sponsors in its sprawling new location at Mandalay Bay, Las Vegas, Nevada.
The maker of secretive FinFisher spyware -- sold exclusively to governments and police agencies -- has been hacked, revealing its clients, prices and its effectiveness across an unbelievable span of apps, operating systems and more.
A new service launched by the companies can decrypt files held to ransom on computer networks by Cryptolocker.
In a rapidly shifting attack landscape against the backdrop of a hackers' black market worth billions, if you wait to pentest -- you lose.
According to reports, Chinese officials no longer approve the use of the two anti-virus software vendors.
With one week until the eve of America's biggest and most controversial hacker conference, we've got a hotlist of explosive talks set to go off at DEF CON 22.
Since May, security firm Sucuri has discovered critical WordPress plugin vulnerabilities affecting four plugins that have nearly 20 million downloads.
Security firm Malwarebytes has secured $30 million in Series A funding from Highland Capital Partners.
New strains of the malevolent Zeus malware have been discovered using the Windows 'PIF' file extension to steal information from compromised computer systems.
RSA researchers uncovered a massive botnet fraud operation that has reaped nearly $4 billion through man-in-the-browser attacks that seamlessly intercept payment of Boletos -- Brazil's version of a money order.
The exploit attempt targeted the Visual Basic Scripting for Applications feature in Microsoft Word.
We're all used to crapware subsidizing Windows PCs. Now firmware-based spyware is subsidizing Android phones. Here's what to look for.
After several major security breaches, is there's another way to do things?