Researchers have indicated that a recently patched integer overflow in Adobe Flash Player has been added to exploit kits.
Military, governments and media from around the world are targets in a campaign identified by Trend Micro.
The malvertising campaign is serving CryptoWall 2.0, researchers at Proofpoint revealed.
Email samples discovered by researchers at Trustwave reveal how attackers are infecting users with the DarkComet Remote Access Trojan.
Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.
As malware doubles on mobile devices and mobility poses a greater risk, virtualization is about protecting data at the source rather than on the device.
Users running vulnerable Adobe software could be in danger of having credentials for Bitcoin websites stolen.
The modular malware was named "Ventir," by researchers at Kaspersky.
The coalition began as an effort to stop the spread of the Hikit trojan, previously known for targeting U.S. defense contractors.
The malware has various features, including the ability to start persistently, take screenshots and bypass user access controls.
The campaign targeted users running vulnerable versions of Internet Explorer.
A group of cybercriminals believed to be Russian are exploiting a zero-day vulnerability to deliver malware and gather information from various organizations around the world.
Sears revealed in a filing to the SEC that Kmart systems were infected with malware "undetectable" by current AV solutions.
Journalist Brian Krebs said the company is sending out advisories to clients saying it would remove the certificate after a 2010 security incident.
Attackers used a third-party vendor's credentials to compromise systems in 395 U.S. Dairy Queen locations and one Orange Julius site.
Roman Seleznev is now charged in a 40-count indictment brought by a federal grand jury in Seattle.
A Tic-tac-toe game is actually a new mobile trojan being used to steal data and spy on Android devices.
A new Facebook scam leverages the popularity of the British actress to infect users with a trojan that steals data and signs up victims to a premium SMS scam.
The malware allowed criminals, with physical access to ATMs, to steal millions, Kaspersky revealed.
After more than 18,000 Macs were infected with iWorm malware, Apple has updated its XProtect system to identify and block certain variants.
The purpose is to add compromised systems to botnets that are primarily focused on launching DDoS attacks.
As the reach of a recent Chase breach grows to 76 million household and seven million business accounts, security experts call for change.
Doctor Web researchers have discovered a new malware that is being used to amass Macs into a giant botnet.
The Electronic Frontier Foundation says the spyware sports a keylogger and is widely distributed by law enforcement agencies.
Two months after SR Labs demonstrated that flaws allow malware to infect USB devices, two researchers have taken the code public.
The trojan is known as Xsser mRAT is targeting protesters in China, but devices have to be jailbroken in order to be infected.
Police are not naming the malware used, but speculation casts an eye on Backdoor.Ploutus or Backdor.PadPin.
The portal is a virus analysis tool that examines suspicious files and shares information about them.
Next year, EMV migration in the U.S. will inevitability change fraudsters' attack methods.
Signature Systems, Inc. confirmed that 108 other businesses were impacted by the malware installed on its systems.