There now are more mobile devices on the planet than humans, and cyber criminals are targeting them at an increasing rate.
The Italian spyware company had its manuals posted online that detail how thoroughly an infected user's actions can be monitored.
The malware has previously been used to steal $220,000 worth of bitcoins from victims.
This Hallows Eve might be a good time to remind ourselves that zombies can be just as deadly, and I'm referring to recycled tools and techniques from years gone by.
The monthly science magazine served up malicious code to readers earlier this week and has remedied the issue.
When it comes to enterprise security, one rule remains constant - attacks will continue to increase in sophistication and attackers will seek to outmaneuver existing defenses.
In a letter, the Motion Picture Association of America asked the United States Trade Representative to include cyberlocker sites on its Notorious Markets List.
In a detailed report, an array of malicious tools and tactics used by a cyberespionage group, called Axiom, are divulged.
The credential-stealing malware Dyre has been tied to a string of phishing attacks.
A Kaspersky Lab survey found that more than a third of businesses have been hit by at least one cybersecurity incident in the last 12 months.
As the holiday shopping season approaches, Damballa's 2014 Q3 State of Infections Report found that malware attacks spiked.
Researchers have indicated that a recently patched integer overflow in Adobe Flash Player has been added to exploit kits.
Military, governments and media from around the world are targets in a campaign identified by Trend Micro.
The malvertising campaign is serving CryptoWall 2.0, researchers at Proofpoint revealed.
Email samples discovered by researchers at Trustwave reveal how attackers are infecting users with the DarkComet Remote Access Trojan.
Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.
As malware doubles on mobile devices and mobility poses a greater risk, virtualization is about protecting data at the source rather than on the device.
Users running vulnerable Adobe software could be in danger of having credentials for Bitcoin websites stolen.
The modular malware was named "Ventir," by researchers at Kaspersky.
The coalition began as an effort to stop the spread of the Hikit trojan, previously known for targeting U.S. defense contractors.
The malware has various features, including the ability to start persistently, take screenshots and bypass user access controls.
The campaign targeted users running vulnerable versions of Internet Explorer.
A group of cybercriminals believed to be Russian are exploiting a zero-day vulnerability to deliver malware and gather information from various organizations around the world.
Sears revealed in a filing to the SEC that Kmart systems were infected with malware "undetectable" by current AV solutions.
Journalist Brian Krebs said the company is sending out advisories to clients saying it would remove the certificate after a 2010 security incident.
Attackers used a third-party vendor's credentials to compromise systems in 395 U.S. Dairy Queen locations and one Orange Julius site.
Roman Seleznev is now charged in a 40-count indictment brought by a federal grand jury in Seattle.
A Tic-tac-toe game is actually a new mobile trojan being used to steal data and spy on Android devices.
A new Facebook scam leverages the popularity of the British actress to infect users with a trojan that steals data and signs up victims to a premium SMS scam.
The malware allowed criminals, with physical access to ATMs, to steal millions, Kaspersky revealed.