Nine individuals are charged in an operation dating back to 2009, which involved infecting computers with the Zeus trojan and using the malware to steal millions.
Rogue Android apps can steal authentication tokens and risk the accounts of some of the most widely used services, including Google, Facebook and Twitter.
Orbit Open Ad Server was vulnerable to SQL injection attacks, which could result in website visitors' information being stolen via malvertising, a security firm found.
Anti-virus company Comodo has identified a variant of the infamous Zeus trojan that is avoiding detection by using a valid digital signature.
The group being implicated has stolen over 160 million card numbers over the years by hacking organizations, including Heartland Payment Systems, Visa and 7-Eleven.
The vulnerability allows fake apps to hijack real app updates then uses them to steal stored information.
As the Target and Neiman Marcus data breach stories continue to evolve, so too does the story of how to combat malware.
Kaiser Permanente is notifying about 5,100 members living in the Northern California region that their personal information may be at risk after malware was discovered on a server.
Cryptocurrency mining malware has been discovered on DVRs that record footage taken by surveillance cameras.
Experts have discovered a piece of malware that has infected 24,000 computers worldwide, and has been used by up to 487 criminal groups.
Some advice from pros for keeping your infrastructure out of the snares of a botnet. Alan Earls reports.
Choosing the right allies to ensure security requirements is a challenge for businesses both large and small, reports James Hale.
This month's news briefs includ revelations at the RSA Conference 2014 in San Francisco, new malware, zero-day fixes and more security news.
In the month since its discovery, CryptoDefense has been profitable for its authors who have targeted Windows users, Symantec says.
Researchers at RSA noted the "battle of the botmasters" taking place.
At least two apps have been discovered on the official Google Play store that mine for cryptocurrencies, but overheating mobile devices and decreased performance may tip off Android users.
A WinRAR vulnerability is being taken advantage of in a malware campaign targeting government and international organizations, as well as Fortune Global 500 companies.
Cribit ransomware demands Bitcoin payment to decrypt hostage files, Trend Micro reveals.
The Gameover variant of the Zeus trojan is targeting employment sites Monster and CareerBuilder, according to F-Secure researchers.
PhishLabs researchers have identified a man-in-the-middle attack campaign that involves hackers posing as major organizations, including banks.
The infamous CryptoLocker ransomware made its way into the computer systems of a Vermont chamber of commerce, costing it $5,000 to replace computers, servers and hard-drives.
Under the right conditions, simply updating any Android device can enable an attacker to escalate app privileges and carry out all sorts of malicious things.
A new multipurpose bot known as Zorenium has recently been updated to work with iOS devices, according to the alleged author.
Criminals are using SMS messages to get cash out of ATMs, according to Symantec.
A new exploit in the wild takes advantage of a disclosed Adobe vulnerability, according to ThreatTrack Security Labs.
An updated version of a malicious software package designed to automate the process of hacking websites is being offered up on underground markets for $3,800 a year, according to a blog by Trend Micro.
Anonymity seekers will only compromise their Apple mobile devices if they download the 99-cent Tor Browser app that is still available in the App Store.
A study by IDC and the National University of Singapore also found a close link between pirated software and cyber security breaches.
Infected users are forced to contend with open windows, which are actually legitimate sites being displayed on their desktops.
The Darlloz worm installs coin mining software on infected computers running Intel x86 architectures.