The malware hits keep coming. Just as the defenses there are new attacks via spyware, adware, viruses and worms. Keep current with the latest threats, which are increasingly creative.
Articles about Malware
The hunt for the malware that's affected nearly a third of the US is on - and it could have all been done by a few teenagers, according to security researchers.
The world's longest-running hacker conference Chaos Communication Congress opens its 30th year with a keynote from Glenn Greenwald this week in Hamburg, Germany. 30C3 has this, and so much more in store.
CryptoLocker has infected an estimated 250,000 victims, demands an average $300 payout, and is trailing millions in laundered Bitcoin. Dell SecureWorks' new paper sheds light on the unstoppable ransomware.
The number of attacks could spike as millions are expected to receive games as presents in the holiday season, especially with the launch of newer consoles like PlayStation and Xbox, says Kaspersky Lab.
The scale of the Cryptolocker threat is disputable. It's the psychology that is truly frightening.
From Facebook to Adobe, 2013 has been a tough year for companies looking to defend against cybercrime.
Trustwave's SpiderLabs found a Pony Botnet Controller server holding over two million passwords and account credentials for ADP payroll, Facebook, Twitter, Yahoo and more belonging to victims around the world.
Bitcoin's wild fluctuations have forced a price update to the Cryptolocker ransomware.
On the fifth day of Christmas, my true love gave to me, an app which stole my identity.
.. a GTA app that I thought was free.
FireEye and Symantec have independently found links from the most recent IE zero-day exploit with other attack campaigns.
According to Trend Micro, consumers are being placed at risk due to rising rates of malware aimed at online banking and malicious applications.
FireEye has followed up on their report of a zero-day attack on Internet Explorer with deeper analysis. It seems to come from the same gang that launched the recent Operation DeputyDog attack.
Emily Williams wasn't real, but the two hackers who created her from social media profiles got her a government job, a company laptop, VPN credentials - and compromised a government network.