Mozilla plans to introduce a feature in Firefox 32 that, based on preliminary testing, could cut the amount of undetected malware downloads in half.
Cheetah Mobile's new study showed that Asian Android users have a two to three times greater risk of downloading malware onto their devices.
Customers who paid with credit and debit cards at a Wendy's in Michigan may have had their payment card compromised if they used it at the restaurant for about a month prior to July 15.
FireEye researchers took a closer look at the malware and provided details in a blog post last week.
Symantec researchers revealed that the backdoor is dropped after attackers exploit a Windows ActiveX vulnerability.
A blog post on Check and Secure website said 70 percent of U.K. users haven't fully updated their internet browsers
Kaspersky Lab has observed Andromeda bot being used to deliver CTB-Locker, a new ransomware that hides its command-and-control server on the Tor network.
A new report reveals how Nigeria's 419 scammers are spreading malware to pocket business funds.
A study by the Information Security Community on LinkedIn found most organizations don't have proper polices and support for BYOD.
Android/Simplocker ransomware now encrypts archive files, asks to be installed as a Device Administrator, and delivers an English-language ransom message.
Researchers at Websense say visitors to Metro.us are sent to websites hosting the Rig Exploit Kit, used in the past to distribute CryptoWall.
The command-and-control for a new ransomware identified by Microsoft as Critroni is hidden on the Tor network.
On Tuesday, Trend Micro released a report detailing Operation Emmental, which targets victims in Austria, Switzerland, Sweden and Japan.
Shortened URLs on Facebook, leading to a risqué webcam video, are actually being used to spread malware.
Bloomberg revealed that hackers used two zero-day flaws to breach NASDAQ's servers in 2010.
Solutionary's SERT research team analyzed threats for the second quarter for its Quarterly Threat Intelligence Report.
The CryptoLocker copycat ransomware was behind the May breach, the firm said in a notification letter to New Hampshire's attorney general.
On Wednesday, Symantec released details on the malware's developed features.
An RCE vulnerability existing in several Cisco Wireless Residential Gateway products can be exploited to serve up fraudulent advertisements and deliver malware.
Sentinel Labs dubbed the repurposed malware "Gyges."
Lookout has identified a ScarePakage mobile ransomware that renders Android phones inoperable and attempts to extort ransom via MoneyPak vouchers.
As of Wednesday afternoon, 127 SSL certificates associated with malware and botnet activities have been blacklisted.
Popular Japanese adult websites have been compromised to distribute the Aibatook banking trojan, a threat that could make its way to the U.S.
In less than a day, over 6,000 infected machines were updated with the new Pushdo variant.
Google has hired a team of researchers who will be dedicated to digging up vulnerabilities, malware and other threats to internet users.
Trusteer warns that the financial malware was first advertised last week on a major underground forum.
Zberp malware was developed from the source code of Zeus and financial malware Carberp.
The Gameover variant of the nefarious Zeus trojan was disrupted in early June, but researchers with Malcovery are observing a return.
BitDefender, the firm that discovered the ransomware, detailed Cryptolocker's chances of making a comeback.
TrapX was alerted to the zero-day attack when the malware targeted servers with "finance" in their host names.